Impact
A path‑expansion overflow occurs in the HTTP request parsing of the TP‑Link Tapo C520WS. The firmware enforces limits on the raw request path but fails to consider the expanded form after normalization. A deliberately crafted URL can cause a buffer overflow and corrupt memory, which then forces the device to reboot or become non‑responsive.
Affected Systems
The affected product is the TP‑Link Tapo C520WS running firmware version 2.6.
Risk and Exploitability
The vulnerability scores a CVSS of 7.1, indicating a high impact. EPSS information is not available, and the vulnerability is not listed in CISA’s KEV catalog. The attack requires an attacker who can send HTTP requests to the device from the adjacent network; no remote access or privileged credentials are needed. A successful exploit leads to service interruption until the device is rebooted or rebooted automatically, severely impairing availability.
OpenCVE Enrichment