CVE-2026-34120

A heap-based buffer overflow vulnerability was identified in TP-Link Tapo C520WS v2.6 within the asynchronous parsing of local video stream content due to insufficient alignment and validation of buffer boundaries when processing streaming inputs.An attacker on the same network segment could trigger heap memory corruption conditions by sending crafted payloads that cause write operations beyond allocated buffer boundaries.  Successful exploitation causes a Denial-of-Service (DoS) condition, causing the device’s process to crash or become unresponsive.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:tapo_c520ws_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tapo_c520ws:2.6:*:*:*:*:*:*:*

History

06 Apr 2026, 20:26

Type Values Removed Values Added
References () https://www.tp-link.com/en/support/download/tapo-c520ws/#Firmware-Release-Notes - () https://www.tp-link.com/en/support/download/tapo-c520ws/#Firmware-Release-Notes - Release Notes
References () https://www.tp-link.com/us/support/download/tapo-c520ws/#Firmware-Release-Notes - () https://www.tp-link.com/us/support/download/tapo-c520ws/#Firmware-Release-Notes - Release Notes
References () https://www.tp-link.com/us/support/faq/5047/ - () https://www.tp-link.com/us/support/faq/5047/ - Vendor Advisory
CPE cpe:2.3:o:tp-link:tapo_c520ws_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tapo_c520ws:2.6:*:*:*:*:*:*:*
First Time Tp-link tapo C520ws Firmware
Tp-link
Tp-link tapo C520ws
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

02 Apr 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-02 18:16

Updated : 2026-04-06 20:26


NVD link : CVE-2026-34120

Mitre link : CVE-2026-34120

CVE.ORG link : CVE-2026-34120


JSON object : View

Products Affected

tp-link

  • tapo_c520ws_firmware
  • tapo_c520ws
CWE
CWE-122

Heap-based Buffer Overflow