The HTTPS server on Tapo C200 V3 does not properly validate the Content-Length header, which can lead to an integer overflow. An unauthenticated attacker on the same local network segment can send crafted HTTPS requests to trigger excessive memory allocation, causing the device to crash and resulting in denial-of-service (DoS).
History

Sat, 20 Dec 2025 01:15:00 +0000

Type Values Removed Values Added
Description The HTTPS server on Tapo C200 V3 does not properly validate the Content-Length header, which can lead to an integer overflow. An unauthenticated attacker on the same local network segment can send crafted HTTPS requests to trigger excessive memory allocation, causing the device to crash and resulting in denial-of-service (DoS).
Title Improper Content-Length Validation in HTTPS Requests on Tapo C200
Weaknesses CWE-770
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published:

Updated: 2025-12-20T00:42:43.806Z

Reserved: 2025-12-08T22:05:00.941Z

Link: CVE-2025-14299

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-20T01:16:02.670

Modified: 2025-12-20T01:16:02.670

Link: CVE-2025-14299

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.