The Tapo C220 v1 and C520WS v2 cameras’ HTTP service does not safely handle POST requests containing an excessively large Content-Length header. The resulting failed memory allocation triggers a NULL pointer dereference, causing the main service process to crash. An unauthenticated attacker can repeatedly crash the service, causing temporary denial of service. The device restarts automatically, and repeated requests can keep it unavailable.
Metrics
Affected Vendors & Products
References
History
Tue, 27 Jan 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 27 Jan 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Tapo C220 v1 and C520WS v2 cameras’ HTTP service does not safely handle POST requests containing an excessively large Content-Length header. The resulting failed memory allocation triggers a NULL pointer dereference, causing the main service process to crash. An unauthenticated attacker can repeatedly crash the service, causing temporary denial of service. The device restarts automatically, and repeated requests can keep it unavailable. | |
| Title | Null Pointer Dereference in Tapo SmartCam HTTP Service on TP-Link Tapo C220 & C520WS | |
| Weaknesses | CWE-476 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2026-01-27T18:07:32.574Z
Reserved: 2026-01-13T19:43:58.914Z
Link: CVE-2026-0918
Updated: 2026-01-27T18:07:21.888Z
Status : Received
Published: 2026-01-27T18:15:54.973
Modified: 2026-01-27T18:15:54.973
Link: CVE-2026-0918
No data.
OpenCVE Enrichment
No data.