CVE-2026-34124
- EPSS 0.03%
- Veröffentlicht 02.04.2026 17:20:20
- Zuletzt bearbeitet 06.04.2026 20:22:38
A denial-of-service vulnerability was identified in TP-Link Tapo C520WS v2.6 within the HTTP request path parsing logic. The implementation enforces length restrictions on the raw request path but does not account for path expansion performed during ...
CVE-2026-34122
- EPSS 0.02%
- Veröffentlicht 02.04.2026 17:20:12
- Zuletzt bearbeitet 06.04.2026 20:23:49
A stack-based buffer overflow vulnerability was identified in TP-Link Tapo C520WS v2.6 within a configuration handling component due to insufficient input validation. An attacker can exploit this vulnerability by supplying an excessively long value ...
CVE-2026-34121
- EPSS 0.12%
- Veröffentlicht 02.04.2026 17:20:06
- Zuletzt bearbeitet 06.04.2026 20:24:48
An authentication bypass vulnerability within the HTTP handling of the DS configuration service in TP-Link Tapo C520WS v2.6 was identified, due to inconsistent parsing and authorization logic in JSON requests during authentication check. An unauthen...
CVE-2026-34120
- EPSS 0.03%
- Veröffentlicht 02.04.2026 17:19:58
- Zuletzt bearbeitet 06.04.2026 20:26:04
A heap-based buffer overflow vulnerability was identified in TP-Link Tapo C520WS v2.6 within the asynchronous parsing of local video stream content due to insufficient alignment and validation of buffer boundaries when processing streaming inputs.An ...
CVE-2026-34119
- EPSS 0.03%
- Veröffentlicht 02.04.2026 17:19:50
- Zuletzt bearbeitet 06.04.2026 20:26:38
A heap-based buffer overflow vulnerability was identified in TP-Link Tapo C520WS v2.6 within the HTTP parsing loop when appending segmented request bodies without continuous write‑boundary verification, due to insufficient boundary validation when ha...
CVE-2026-34118
- EPSS 0.03%
- Veröffentlicht 02.04.2026 17:19:43
- Zuletzt bearbeitet 06.04.2026 20:26:55
A heap-based buffer overflow vulnerability was identified in TP-Link Tapo C520WS v2.6 in the HTTP POST body parsing logic due to missing validation of remaining buffer capacity after dynamic allocation, due to insufficient boundary validation when ha...