A stack-based buffer overflow vulnerability was identified in TP-Link Tapo C520WS v2.6 within a configuration handling component due to insufficient input validation. An attacker can exploit this vulnerability by supplying an excessively long value for a vulnerable configuration parameter, resulting in a stack overflow.
Successful exploitation results in Denial-of-Service (DoS) condition, leading to a service crash or device reboot, impacting availability.
References
| Link | Resource |
|---|---|
| https://www.tp-link.com/en/support/download/tapo-c520ws/#Firmware-Release-Notes | Release Notes |
| https://www.tp-link.com/us/support/download/tapo-c520ws/#Firmware-Release-Notes | Release Notes |
| https://www.tp-link.com/us/support/faq/5047/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
06 Apr 2026, 20:23
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.tp-link.com/en/support/download/tapo-c520ws/#Firmware-Release-Notes - Release Notes | |
| References | () https://www.tp-link.com/us/support/download/tapo-c520ws/#Firmware-Release-Notes - Release Notes | |
| References | () https://www.tp-link.com/us/support/faq/5047/ - Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| First Time |
Tp-link tapo C520ws Firmware
Tp-link Tp-link tapo C520ws |
|
| CPE | cpe:2.3:o:tp-link:tapo_c520ws_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:tp-link:tapo_c520ws:2.6:*:*:*:*:*:*:* |
02 Apr 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-02 18:16
Updated : 2026-04-06 20:23
NVD link : CVE-2026-34122
Mitre link : CVE-2026-34122
CVE.ORG link : CVE-2026-34122
JSON object : View
Products Affected
tp-link
- tapo_c520ws_firmware
- tapo_c520ws
CWE
CWE-121
Stack-based Buffer Overflow
