🔐 CVE Alert

CVE-2026-0919

UNKNOWN 0.0

Unauthenticated Denial of Service via Oversized URL in HTTP Parser on TP-Link Tapo C210, C220 & C520WS

CVSS Score
0.0
EPSS Score
0.1%
EPSS Percentile
27th

The HTTP parser of Tapo C210 v3, C220 v1 and C520WS v2 cameras improperly handles requests containing an excessively long URL path. An invalid‑URL error path continues into cleanup code that assumes allocated buffers exist, leading to a crash and service restart. An unauthenticated attacker can force repeated service crashes or device reboots, causing denial of service.

CWE CWE-20
Vendor tp-link systems inc.
Product tapo c220 v1
Published Jan 27, 2026
Last Updated Apr 29, 2026
Stay Ahead of the Next One

Get instant alerts for tp-link systems inc. tapo c220 v1

Be the first to know when new unknown vulnerabilities affecting tp-link systems inc. tapo c220 v1 are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

TP-Link Systems Inc. / Tapo C220 v1
0 < 1.4.2 Build 251112
TP-Link Systems Inc. / Tapo C520WS v2
0 < 1.2.3 Build 251114
TP Link Systems Inc. / Tapo C210 v3
0 < 1.2.6 Build 260328

References

NVD ↗ CVE.org ↗ EPSS Data ↗
tp-link.com: https://www.tp-link.com/us/support/download/tapo-c220/v1.60/ tp-link.com: https://www.tp-link.com/en/support/download/tapo-c220/v1/ tp-link.com: https://www.tp-link.com/us/support/download/tapo-c520ws/v2/ tp-link.com: https://www.tp-link.com/en/support/download/tapo-c520ws/v2/ tp-link.com: https://www.tp-link.com/us/support/faq/4923/ tp-link.com: https://www.tp-link.com/us/support/download/tapo-c210/v3/ tp-link.com: https://www.tp-link.com/en/support/download/tapo-c210/v3/

Credits

Diogo Almeida @NeWbie Giuseppe Signorelli