Description
The HTTPS server on Tapo C200 V3 does not properly validate the Content-Length header, which can lead to an integer overflow. An unauthenticated attacker on the same local network segment can send crafted HTTPS requests to trigger excessive memory allocation, causing the device to crash and resulting in denial-of-service (DoS).
Scores
CVSS v3
6.5
EPSS
0.0008
EPSS Percentile
23.2%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-190
CWE-770
Status
published
Products (12)
tp-link/tapo_c200_firmware
1.3.3 build_230228
tp-link/tapo_c200_firmware
1.3.4 build_230424
tp-link/tapo_c200_firmware
1.3.5 build_230717
tp-link/tapo_c200_firmware
1.3.7 build_230920
tp-link/tapo_c200_firmware
1.3.9 build_231019
tp-link/tapo_c200_firmware
1.3.11 build_231115
tp-link/tapo_c200_firmware
1.3.13 build_240327
tp-link/tapo_c200_firmware
1.3.14 build_240513
tp-link/tapo_c200_firmware
1.3.15 build_240715
tp-link/tapo_c200_firmware
1.4.1 build_241212
... and 2 more
Published
Dec 20, 2025
Tracked Since
Feb 18, 2026