Impact
A stack-based buffer overflow occurs in the Tapo C520WS when an attacker supplies an excessively long value for a vulnerable configuration parameter. This overflow corrupts the stack, causing the device to crash or reboot, which results in a denial‑of‑service condition that makes the smart plug unavailable to users.
Affected Systems
The vulnerability affects TP‑Link Systems Inc.’s Tapo C520WS smart plug, specifically firmware version 2.6. The device’s configuration handling component is the entry point for the overflow.
Risk and Exploitability
With a CVSS base score of 7.1, the vulnerability poses a significant risk to availability. The EPSS score is not available, and it is not listed in the CISA KEV catalog. While the description does not state the exact interface, it is inferred that an attacker could trigger the overflow remotely by sending a crafted configuration value over the device’s management interface, leading to a crash or reboot.
OpenCVE Enrichment