Impact
A heap‑based buffer overflow exists in the HTTP POST body parsing logic of TP‑Link Tapo C520WS firmware 2.6, caused by missing validation of remaining buffer capacity after dynamic allocation. The vulnerability allows crafted HTTP requests to write beyond the intended buffer, corrupting heap memory. Successful exploitation results in the device’s core process crashing or becoming unresponsive, effectively denying service to users on the network segment.
Affected Systems
Only the TP‑Link Tapo C520WS camera running firmware version 2.6 is listed as affected. No other devices or firmware versions are referenced as vulnerable in the available information.
Risk and Exploitability
The CVSS score of 7.1 indicates moderate to high impact, while the EPSS score of less than 1% implies a low probability of widespread exploitation. The flaw is not cataloged in CISA's list of known exploited vulnerabilities. Attack requires local network access and involves sending malicious HTTP POST payloads from any host on the same segment. An attacker who can reach the camera can trigger a crash without gaining further access to the device or its network.
OpenCVE Enrichment