CVE-2026-34124

A denial-of-service vulnerability was identified in TP-Link Tapo C520WS v2.6 within the HTTP request path parsing logic. The implementation enforces length restrictions on the raw request path but does not account for path expansion performed during normalization. An attacker on the adjacent network may send a crafted HTTP request to cause buffer overflow and memory corruption, leading to system interruption or device reboot.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:tapo_c520ws_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tapo_c520ws:2.6:*:*:*:*:*:*:*

History

06 Apr 2026, 20:22

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
References () https://www.tp-link.com/en/support/download/tapo-c520ws/#Firmware-Release-Notes - () https://www.tp-link.com/en/support/download/tapo-c520ws/#Firmware-Release-Notes - Release Notes
References () https://www.tp-link.com/us/support/download/tapo-c520ws/#Firmware-Release-Notes - () https://www.tp-link.com/us/support/download/tapo-c520ws/#Firmware-Release-Notes - Release Notes
References () https://www.tp-link.com/us/support/faq/5047/ - () https://www.tp-link.com/us/support/faq/5047/ - Vendor Advisory
CPE cpe:2.3:o:tp-link:tapo_c520ws_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tapo_c520ws:2.6:*:*:*:*:*:*:*
First Time Tp-link tapo C520ws Firmware
Tp-link
Tp-link tapo C520ws

02 Apr 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-02 18:16

Updated : 2026-04-06 20:22


NVD link : CVE-2026-34124

Mitre link : CVE-2026-34124

CVE.ORG link : CVE-2026-34124


JSON object : View

Products Affected

tp-link

  • tapo_c520ws_firmware
  • tapo_c520ws
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')