Heap-based Buffer Overflow in TP-Link Tapo C520WS
CVE-2026-34119

7.1HIGH

What is CVE-2026-34119?

A heap-based buffer overflow vulnerability in TP-Link Tapo C520WS v2.6 has been identified during the HTTP parsing loop. This issue arises when appending segmented request bodies without proper validation of write boundaries, allowing for insufficient boundary checks on external HTTP input. An attacker on the same network can exploit this vulnerability by sending specially crafted payloads that lead to memory corruption, potentially resulting in a Denial-of-Service (DoS) condition. This exploitation method can cause the device to crash or become unresponsive.

Affected Version(s)

Tapo C520WS v2.6 0 < 1.2.4 Build 260326 Rel.24666n

References

CVSS V4

Score:
7.1
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.