Security Advisory on Vulnerabilities in Tapo C200 (CVE-2025-8065, CVE-2025-14299 & CVE-2025-14300) and Tapo C520WS (CVE-2025-8065)
Vulnerabilities Description and Impacts:
CVE-2025-8065: Remote Code Execution via Stack-based Buffer Overflow in ONVIF SOAP Parser in Tapo C200 v3 and Tapo C520WS v2.6
A stack-based buffer overflow vulnerability was identified in the ONVIF SOAP XML Parser. When processing XML tags with namespace prefixes, the parser fails to validate the prefix length before copying it to a fixed-size stack buffer. It allowed a crafted SOAP request with an oversized namespace prefix to cause memory corruption in stack.
An unauthenticated attacker on the same local network may exploit this flaw to enable remote code execution with elevated privileges, leading to full compromise of the device.
CVSS v4.0 Score: 8.7 / High
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVE-2025-14299: Improper Content-Length Validation in HTTPS Requests in Tapo C200 v3
- The HTTPS server does not properly validate the Content-Length header, which could lead to an Integer Overflow.
- An unauthenticated attacker on the same local network segment can send crafted HTTPS requests to crash the device, resulting in DoS.
CVSS v4.0 Score: 7.1 / High
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
CVE-2025-14300: Unauthenticated Access to connectAP API Endpoint in Tapo C200 v3
- The HTTPS Service exposes a connectAP interface without proper authentication.
- An unauthenticated attacker on the same local network segment can modify the device’s Wi-Fi configuration, resulting in loss of connectivity and DoS.
CVSS v4.0 Score: 8.7 / High
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Affected Products/Versions and Fixes:
|
Affected Product Model |
Related Vulnerabilities |
Affected Version |
|
Tapo C520WS v2.6 |
CVE-2025-8065 |
< 1.2.4 Build 260326 Rel.24666n |
|
Tapo C200 V3 |
CVE-2025-8065 CVE-2025-14299 CVE-2025-14300 |
< Tapo C200(US)_V3_1.4.5 Build 251104 |
Recommendations:
We strongly recommend that users with affected devices take the following actions:
- Check and Update on Tapo Mobile Application to fix the vulnerabilities.
US: Download for Tapo C200 | TP-Link
Download for Tapo C520WS | TP-Link
EN: Download for Tapo C520WS | TP-Link
Disclaimer:
If you do not take all of the recommended actions, this vulnerability concern will remain. TP-Link will not bear any responsibility for the consequences that could have been avoided by following the recommended actions in this advisory.
Is this faq useful?
Your feedback helps improve this site.
TP-Link Community
Still need help? Search for answers, ask questions, and get help from TP-Link experts and other users around the world.