Authentication Bypass in Tapo C200 V3 by TP-Link
CVE-2025-14300

8.7HIGH

Key Information:

Vendor
CVE Published:
20 December 2025

What is CVE-2025-14300?

The Tapo C200 V3 from TP-Link has a significant security flaw within its HTTPS service, exposing a connectAP interface that lacks adequate authentication mechanisms. This vulnerability allows an unauthenticated attacker on the same local network segment to exploit the device, enabling them to alter Wi-Fi settings. Such unauthorized changes can lead to loss of connectivity for legitimate users and can result in a denial-of-service situation, impacting the overall functionality of the device.

Affected Version(s)

Tapo C200 V3 0

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Simone Margaritelli (evilsocket)
.
CVE-2025-14300 : Authentication Bypass in Tapo C200 V3 by TP-Link