Impact
The vulnerability is a heap-based buffer overflow located in the HTTP parsing loop of TP‑Link Tapo C520WS firmware v2.6. When the firmware appends segmented request bodies without verifying boundaries, an attacker can send an HTTP request that writes past the allocated buffer. This over‑write corrupts heap memory and results in a crash or unresponsive state of the device’s main process, effectively denying normal operation to legitimate users.
Affected Systems
The flaw affects only the TP‑Link Tapo C520WS model running firmware version 2.6. No other versions or products are listed, so only units with that specific firmware are vulnerable.
Risk and Exploitability
The CVSS score of 7.1 reflects a moderate severity, and the EPSS score of less than 1 % indicates low current exploitation probability. The attack requires an adversary on the same local network segment that can issue specially crafted HTTP traffic; the description explicitly notes this local‑network requirement. Because the flaw leads exclusively to a denial of service and no privilege escalation or data exposure is documented, the overall impact is limited to availability. The vulnerability is not listed in CISA’s KEV catalog, suggesting no documented active exploitation at the time of disclosure.
OpenCVE Enrichment