CVE-2026-0919
Unauthenticated Denial of Service via Oversized URL in HTTP Parser on TP-Link Tapo C210, C220 & C520WS
CVSS Score
0.0
EPSS Score
0.1%
EPSS Percentile
27th
The HTTP parser of Tapo C210 v3, C220 v1 and C520WS v2 cameras improperly handles requests containing an excessively long URL path. An invalid‑URL error path continues into cleanup code that assumes allocated buffers exist, leading to a crash and service restart. An unauthenticated attacker can force repeated service crashes or device reboots, causing denial of service.
| CWE | CWE-20 |
| Vendor | tp-link systems inc. |
| Product | tapo c220 v1 |
| Published | Jan 27, 2026 |
| Last Updated | Apr 29, 2026 |
Stay Ahead of the Next One
Get instant alerts for tp-link systems inc. tapo c220 v1
Be the first to know when new unknown vulnerabilities affecting tp-link systems inc. tapo c220 v1 are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
Affected Versions
TP-Link Systems Inc. / Tapo C220 v1
0 < 1.4.2 Build 251112
TP-Link Systems Inc. / Tapo C520WS v2
0 < 1.2.3 Build 251114
TP Link Systems Inc. / Tapo C210 v3
0 < 1.2.6 Build 260328
References
tp-link.com: https://www.tp-link.com/us/support/download/tapo-c220/v1.60/ tp-link.com: https://www.tp-link.com/en/support/download/tapo-c220/v1/ tp-link.com: https://www.tp-link.com/us/support/download/tapo-c520ws/v2/ tp-link.com: https://www.tp-link.com/en/support/download/tapo-c520ws/v2/ tp-link.com: https://www.tp-link.com/us/support/faq/4923/ tp-link.com: https://www.tp-link.com/us/support/download/tapo-c210/v3/ tp-link.com: https://www.tp-link.com/en/support/download/tapo-c210/v3/
Credits
Diogo Almeida @NeWbie Giuseppe Signorelli