A denial-of-service vulnerability was identified in TP-Link Tapo C520WS v2.6 within the HTTP request path parsing logic. The implementation enforces length restrictions on the raw request path but does not account for path expansion performed during normalization. An attacker on the adjacent network may send a crafted HTTP request to cause buffer overflow and memory corruption, leading to system interruption or device reboot.
References
| Link | Resource |
|---|---|
| https://www.tp-link.com/en/support/download/tapo-c520ws/#Firmware-Release-Notes | Release Notes |
| https://www.tp-link.com/us/support/download/tapo-c520ws/#Firmware-Release-Notes | Release Notes |
| https://www.tp-link.com/us/support/faq/5047/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
06 Apr 2026, 20:22
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| References | () https://www.tp-link.com/en/support/download/tapo-c520ws/#Firmware-Release-Notes - Release Notes | |
| References | () https://www.tp-link.com/us/support/download/tapo-c520ws/#Firmware-Release-Notes - Release Notes | |
| References | () https://www.tp-link.com/us/support/faq/5047/ - Vendor Advisory | |
| CPE | cpe:2.3:o:tp-link:tapo_c520ws_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:tp-link:tapo_c520ws:2.6:*:*:*:*:*:*:* |
|
| First Time |
Tp-link tapo C520ws Firmware
Tp-link Tp-link tapo C520ws |
02 Apr 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-02 18:16
Updated : 2026-04-06 20:22
NVD link : CVE-2026-34124
Mitre link : CVE-2026-34124
CVE.ORG link : CVE-2026-34124
JSON object : View
Products Affected
tp-link
- tapo_c520ws_firmware
- tapo_c520ws
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
