CVE-2026-34121
HIGHAuthentication Bypass in DS Configuration Service via HTTP Request Parsing Differential of TP-Link Tapo C520WS
Title source: cnaDescription
An authentication bypass vulnerability within the HTTP handling of the DS configuration service in TP-Link Tapo C520WS v2.6 was identified, due to inconsistent parsing and authorization logic in JSON requests during authentication check. An unauthenticated attacker can append an authentication-exempt action to a request containing privileged DS do actions, bypassing authorization checks. Successful exploitation allows unauthenticated execution of restricted configuration actions, which may result in unauthorized modification of device state.
Scores
CVSS v3
8.8
EPSS
0.0010
EPSS Percentile
27.2%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-287
Status
published
Products (2)
tp-link/tapo_c520ws_firmware
< 1.2.4
TP-Link Systems Inc./Tapo C520WS v2.6
< 1.2.4 Build 260326 Rel.24666n
Published
Apr 02, 2026
Tracked Since
Apr 02, 2026