CVE-2026-34119

A heap-based buffer overflow vulnerability was identified in TP-Link Tapo C520WS v2.6 within the HTTP parsing loop when appending segmented request bodies without continuous write‑boundary verification, due to insufficient boundary validation when handling externally supplied HTTP input.  An attacker on the same network segment could trigger heap memory corruption conditions by sending crafted payloads that cause write operations beyond allocated buffer boundaries.  Successful exploitation causes a Denial-of-Service (DoS) condition, causing the device’s process to crash or become unresponsive.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:tapo_c520ws_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tapo_c520ws:2.6:*:*:*:*:*:*:*

History

06 Apr 2026, 20:26

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
First Time Tp-link tapo C520ws Firmware
Tp-link
Tp-link tapo C520ws
References () https://www.tp-link.com/en/support/download/tapo-c520ws/#Firmware-Release-Notes - () https://www.tp-link.com/en/support/download/tapo-c520ws/#Firmware-Release-Notes - Release Notes
References () https://www.tp-link.com/us/support/download/tapo-c520ws/#Firmware-Release-Notes - () https://www.tp-link.com/us/support/download/tapo-c520ws/#Firmware-Release-Notes - Release Notes
References () https://www.tp-link.com/us/support/faq/5047/ - () https://www.tp-link.com/us/support/faq/5047/ - Vendor Advisory
CPE cpe:2.3:o:tp-link:tapo_c520ws_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tapo_c520ws:2.6:*:*:*:*:*:*:*

02 Apr 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-02 18:16

Updated : 2026-04-06 20:26


NVD link : CVE-2026-34119

Mitre link : CVE-2026-34119

CVE.ORG link : CVE-2026-34119


JSON object : View

Products Affected

tp-link

  • tapo_c520ws_firmware
  • tapo_c520ws
CWE
CWE-122

Heap-based Buffer Overflow