Heap-Based Buffer Overflow Vulnerability in TP-Link Tapo C520WS
CVE-2026-34118

7.1HIGH

What is CVE-2026-34118?

A heap-based buffer overflow vulnerability was discovered in the TP-Link Tapo C520WS v2.6, stemming from inadequate validation of buffer capacity during HTTP POST body parsing. This oversight allows an attacker on the same network segment to exploit the vulnerability by sending specially crafted payloads, resulting in heap memory corruption. The successful execution of this exploit can trigger a Denial-of-Service condition, leading the affected device's process to crash or become unresponsive.

Affected Version(s)

Tapo C520WS v2.6 0 < 1.2.4 Build 260326 Rel.24666n

References

CVSS V4

Score:
7.1
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.