← Volver a CVEs
CVE-2026-34124
MEDIUM6.5
Descripcion
A denial-of-service vulnerability was identified in TP-Link Tapo C520WS v2.6 within the HTTP request path parsing logic. The implementation enforces length restrictions on the raw request path but does not account for path expansion performed during normalization. An attacker on the adjacent network may send a crafted HTTP request to cause buffer overflow and memory corruption, leading to system interruption or device reboot.
Detalles CVE
Puntuacion CVSS v3.16.5
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vector de ataqueADJACENT_NETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado4/2/2026
Ultima modificacion4/6/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
tp-link:tapo_c520wstp-link:tapo_c520ws_firmware
Debilidades (CWE)
CWE-120
Referencias
https://www.tp-link.com/en/support/download/tapo-c520ws/#Firmware-Release-Notes(f23511db-6c3e-4e32-a477-6aa17d310630)
https://www.tp-link.com/us/support/download/tapo-c520ws/#Firmware-Release-Notes(f23511db-6c3e-4e32-a477-6aa17d310630)
https://www.tp-link.com/us/support/faq/5047/(f23511db-6c3e-4e32-a477-6aa17d310630)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.