๐Ÿ” CVE Alert

CVE-2026-34124

UNKNOWN 0.0

Denial of Service via Path Expansion Overflow in HTTP Service in TP-Link Tapo C520WS

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

A denial-of-service vulnerability was identified in TP-Link Tapo C520WS v2.6 within the HTTP request path parsing logic. The implementation enforces length restrictions on the raw request path but does not account for path expansion performed during normalization. An attacker on the adjacent network may send a crafted HTTP request to cause buffer overflow and memory corruption, leading to system interruption or device reboot.

CWE CWE-120
Vendor tp-link systems inc.
Product tapo c520ws v2.6
Published Apr 2, 2026
Last Updated Apr 3, 2026
Stay Ahead of the Next One

Get instant alerts for tp-link systems inc. tapo c520ws v2.6

Be the first to know when new unknown vulnerabilities affecting tp-link systems inc. tapo c520ws v2.6 are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

TP-Link Systems Inc. / Tapo C520WS v2.6
0 < 1.2.4 Build 260326 Rel.24666n

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
tp-link.com: https://www.tp-link.com/us/support/download/tapo-c520ws/#Firmware-Release-Notes tp-link.com: https://www.tp-link.com/en/support/download/tapo-c520ws/#Firmware-Release-Notes tp-link.com: https://www.tp-link.com/us/support/faq/5047/