🔐 CVE Alert

CVE-2026-34120

UNKNOWN 0.0

Heap-based Buffer Overflow Vulnerability Leading to Denial-of-Service in TP-Link Tapo C520WS

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

A heap-based buffer overflow vulnerability was identified in TP-Link Tapo C520WS v2.6 within the asynchronous parsing of local video stream content due to insufficient alignment and validation of buffer boundaries when processing streaming inputs.An attacker on the same network segment could trigger heap memory corruption conditions by sending crafted payloads that cause write operations beyond allocated buffer boundaries.  Successful exploitation causes a Denial-of-Service (DoS) condition, causing the device’s process to crash or become unresponsive.

CWE CWE-122
Vendor tp-link systems inc.
Product tapo c520ws v2.6
Published Apr 2, 2026
Last Updated Apr 2, 2026
Stay Ahead of the Next One

Get instant alerts for tp-link systems inc. tapo c520ws v2.6

Be the first to know when new unknown vulnerabilities affecting tp-link systems inc. tapo c520ws v2.6 are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

TP-Link Systems Inc. / Tapo C520WS v2.6
0 < 1.2.4 Build 260326 Rel.24666n

References

NVD ↗ CVE.org ↗ EPSS Data ↗
tp-link.com: https://www.tp-link.com/us/support/download/tapo-c520ws/#Firmware-Release-Notes tp-link.com: https://www.tp-link.com/en/support/download/tapo-c520ws/#Firmware-Release-Notes tp-link.com: https://www.tp-link.com/us/support/faq/5047/