CVE-2025-14300
HIGHTapo C200 V3 - DoS
Title source: llmDescription
The HTTPS service on Tapo C200 V3 exposes a connectAP interface without proper authentication. An unauthenticated attacker on the same local network segment can exploit this to modify the device’s Wi-Fi configuration, resulting in loss of connectivity and denial-of-service (DoS).
Scores
CVSS v3
8.1
EPSS
0.0010
EPSS Percentile
28.1%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Classification
CWE
CWE-306
Status
published
Affected Products (12)
tp-link/tapo_c200_firmware
tp-link/tapo_c200_firmware
tp-link/tapo_c200_firmware
tp-link/tapo_c200_firmware
tp-link/tapo_c200_firmware
tp-link/tapo_c200_firmware
tp-link/tapo_c200_firmware
tp-link/tapo_c200_firmware
tp-link/tapo_c200_firmware
tp-link/tapo_c200_firmware
tp-link/tapo_c200_firmware
tp-link/tapo_c200_firmware
Timeline
Published
Dec 20, 2025
Tracked Since
Feb 18, 2026