Impact
A heap‑based buffer overflow exists in the HTTP POST body parsing logic of the TP‑Link Tapo C520WS firmware version 2.6. When malicious data is POSTed, the device allocates a buffer but does not verify that the buffer is large enough for the incoming content. This omission allows an attacker to write beyond the end of the buffer, corrupting heap memory. Because the overflow can cause the camera’s main process to crash or hang, the device becomes non‑responsive, resulting in a denial of service.
Affected Systems
The vulnerability impacts TP‑Link Systems Inc.’s Tapo C520WS camera running firmware 2.6. No other vendors or products are listed as affected.
Risk and Exploitability
The flaw receives a CVSS score of 7.1, indicating high severity. No EPSS score is published, and the issue is not included in CISA’s Known Exploited Vulnerabilities catalog, so exploitation likelihood is moderate. A local attacker on the same network segment can send crafted HTTP POST requests to trigger the overflow, causing the device to crash or become unresponsive.
OpenCVE Enrichment