Impact
A stack‑based buffer overflow exists in the ONVIF SOAP XML Parser of Tapo devices. When the parser receives XML tags with excessively long namespace prefixes, it copies the prefix into a fixed‑size stack buffer without checking its length, corrupting memory. An attacker with local network access can send a crafted SOAP request that triggers this overflow, allowing them to execute arbitrary code with elevated privileges and fully compromise the device.
Affected Systems
The flaw affects TP‑Link Tapo C200 v3 firmware versions 1.3.x through 1.4.x and the Tapo C520WS v2.6 firmware. Devices running any of the listed firmware builds are vulnerable.
Risk and Exploitability
The CVSS score of 8.7 indicates a high severity. The EPSS score of less than 1% suggests the likelihood of exploitation is currently low, and the vulnerability is not flagged in the CISA KEV catalog. The attack vector is local network; an unauthenticated attacker can target the device via the ONVIF SOAP interface, send the malicious XML payload, and achieve remote code execution with full device privileges.
OpenCVE Enrichment