CVE-2026-34121

HIGH

Authentication Bypass in DS Configuration Service via HTTP Request Parsing Differential of TP-Link Tapo C520WS

Title source: cna
STIX 2.1

Description

An authentication bypass vulnerability within the HTTP handling of the DS configuration service in TP-Link Tapo C520WS v2.6 was identified, due to inconsistent parsing and authorization logic in JSON requests during authentication check. An unauthenticated attacker can append an authentication-exempt action to a request containing privileged DS do actions, bypassing authorization checks. Successful exploitation allows unauthenticated execution of restricted configuration actions, which may result in unauthorized modification of device state.

Scores

CVSS v3 8.8
EPSS 0.0010
EPSS Percentile 27.2%
Attack Vector ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-287
Status published
Products (2)
tp-link/tapo_c520ws_firmware < 1.2.4
TP-Link Systems Inc./Tapo C520WS v2.6 < 1.2.4 Build 260326 Rel.24666n
Published Apr 02, 2026
Tracked Since Apr 02, 2026