CVE-2025-14300
- EPSS 0.11%
- Veröffentlicht 20.12.2025 00:43:39
- Zuletzt bearbeitet 03.04.2026 22:16:24
The HTTPS service on Tapo C200 V3 exposes a connectAP interface without proper authentication. An unauthenticated attacker on the same local network segment can exploit this to modify the device’s Wi-Fi configuration, resulting in loss of connectivit...
CVE-2025-14299
- EPSS 0.08%
- Veröffentlicht 20.12.2025 00:42:43
- Zuletzt bearbeitet 08.01.2026 19:38:06
The HTTPS server on Tapo C200 V3 does not properly validate the Content-Length header, which can lead to an integer overflow. An unauthenticated attacker on the same local network segment can send crafted HTTPS requests to trigger excessive memory al...
CVE-2025-8065
- EPSS 0.08%
- Veröffentlicht 20.12.2025 00:41:56
- Zuletzt bearbeitet 03.04.2026 17:16:41
A stack-based buffer overflow vulnerability was identified in the ONVIF SOAP XML Parser in Tapo C200 v3 and C520WS v2.6. When processing XML tags with namespace prefixes, the parser fails to validate the prefix length before copying it to a fixed-siz...
CVE-2023-49515
- EPSS 0.11%
- Veröffentlicht 17.01.2024 02:15:06
- Zuletzt bearbeitet 21.11.2024 08:33:29
Insecure Permissiosn vulnerability in TP Link TC70 and C200 WIFI Camera v.3 firmware v.1.3.4 and fixed in v.1.3.11 allows a physically proximate attacker to obtain sensitive information via a connection to the UART pin components.
CVE-2023-27126
- EPSS 0.05%
- Veröffentlicht 06.06.2023 18:15:10
- Zuletzt bearbeitet 08.01.2025 16:15:27
The AES Key-IV pair used by the TP-Link TAPO C200 camera V3 (EU) on firmware version 1.1.22 Build 220725 is reused across all cameras. An attacker with physical access to a camera is able to extract and decrypt sensitive data containing the Wifi pass...
- EPSS 91.01%
- Veröffentlicht 10.03.2022 17:44:51
- Zuletzt bearbeitet 21.11.2024 06:36:47
TP-Link Tapo C200 IP camera, on its 1.1.15 firmware version and below, is affected by an unauthenticated RCE vulnerability, present in the uhttpd binary running by default as root. The exploitation of this vulnerability allows an attacker to take ful...
CVE-2020-11445
- EPSS 0.22%
- Veröffentlicht 01.04.2020 04:15:13
- Zuletzt bearbeitet 21.11.2024 04:57:55
TP-Link cloud cameras through 2020-02-09 allow remote attackers to bypass authentication and obtain sensitive information via vectors involving a Wi-Fi session with GPS enabled, aka CNVD-2020-04855.