Impact
The flaw lies in TP‑Link Tapo C520WS v2.6’s HTTP request path‑parsing module. The implementation enforces a maximum length on the raw request path but fails to account for the expansion that occurs during URI normalization. This oversight allows an attacker to send a specially crafted HTTP request that overflows a buffer, corrupts memory, and ultimately interrupts the device’s operation or forces a reboot.
Affected Systems
Only the TP‑Link Tapo C520WS camera running firmware v2.6 is affected. The vulnerability is tied to the device’s HTTP service and would be exploitable by an adversary who can communicate with the camera over the local network.
Risk and Exploitability
The CVSS score of 7.1 indicates substantial impact, yet the EPSS score is below 1 % and the weakness is not listed in the CISA KEV catalog. The likely attack vector is local network access; an attacker must be able to transmit HTTP traffic to the device, making it most relevant for unmanaged or poorly segmented networks.
OpenCVE Enrichment