Impact
A stack-based buffer overflow has been identified in the configuration handling component of the TP-Link Tapo C520WS firmware version 2.6. The vulnerability arises because the firmware does not properly validate the length of a configuration parameter supplied by an operator. When an unusually long value is provided, the input overflows the stack, causing the device’s management service to crash or the device itself to reboot. The failure mode is an availability loss, with no direct compromise of data confidentiality or integrity. This weakness is categorized as CWE-121.
Affected Systems
The affected system is the TP-Link Tapo C520WS camera running firmware version 2.6. No other versions or models are listed as impacted in the CNA data.
Risk and Exploitability
The vulnerability carries a CVSS score of 7.1, indicating moderate severity, and an EPSS score of less than 1%, suggesting a low likelihood of exploitation in the wild. It is not listed in the CISA KEV catalog. The likely attack vector is remote, via the device’s web or management interface, where an attacker can submit the oversized configuration value without needing local access. Successful exploitation results in service crashes or device restarts, causing downtime for any applications relying on continuous camera operation.
OpenCVE Enrichment