Statement on Unauthenticated Protocol Commands on TP-Link KP303 (CVE-2025-8627)
Vulnerability Description:
The TP-Link KP303 Smartplug can be issued unauthenticated protocol commands that may cause unintended power-off condition and potential information leak.
Impact:
The unauthenticated protocol commands may be executed on the device.
CVSS v4.0 Score: 8.7 / High
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Affected Products/Versions and Fixes:
Affected Product Model |
Related Vulnerabilities |
Affected Version |
Fixed Version |
TP-Link KP303 V2.0 (US) |
CVE-2025-8627 |
Firmware < 1.1.0 |
Firmware >= 1.1.0 |
Recommendation(s):
We strongly recommended that users with the affected device(s) take the following action(s):
- Update to the latest firmware to fix the vulnerabilities.
Disclaimer:
If you do not take the recommended action(s) stated above, this vulnerability concern will remain. TP-Link cannot bear any responsibility for the consequences that could have been avoided by following the recommended action(s) in this statement.
Is this faq useful?
Your feedback helps improve this site.

TP-Link Community
Still need help? Search for answers, ask questions, and get help from TP-Link experts and other users around the world.