CVE-2025-14300

HIGH

Tapo C200 V3 - DoS

Title source: llm

Description

The HTTPS service on Tapo C200 V3 exposes a connectAP interface without proper authentication. An unauthenticated attacker on the same local network segment can exploit this to modify the device’s Wi-Fi configuration, resulting in loss of connectivity and denial-of-service (DoS).

Scores

CVSS v3 8.1
EPSS 0.0010
EPSS Percentile 28.1%
Attack Vector ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

Classification

CWE
CWE-306
Status published

Affected Products (12)

tp-link/tapo_c200_firmware
tp-link/tapo_c200_firmware
tp-link/tapo_c200_firmware
tp-link/tapo_c200_firmware
tp-link/tapo_c200_firmware
tp-link/tapo_c200_firmware
tp-link/tapo_c200_firmware
tp-link/tapo_c200_firmware
tp-link/tapo_c200_firmware
tp-link/tapo_c200_firmware
tp-link/tapo_c200_firmware
tp-link/tapo_c200_firmware

Timeline

Published Dec 20, 2025
Tracked Since Feb 18, 2026