Metrics
Affected Vendors & Products
Wed, 11 Mar 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link tapo C220
Tp-link tapo C220 Firmware Tp-link tapo C520ws Tp-link tapo C520ws Firmware |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:h:tp-link:tapo_c220:1:*:*:*:*:*:*:* cpe:2.3:h:tp-link:tapo_c520ws:2:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tapo_c220_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tapo_c520ws_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tp-link tapo C220
Tp-link tapo C220 Firmware Tp-link tapo C520ws Tp-link tapo C520ws Firmware |
|
| Metrics |
cvssV3_1
|
Wed, 28 Jan 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link
Tp-link tapo Tp-link tapo C220 V1 Tp-link tapo C520ws V2 |
|
| Vendors & Products |
Tp-link
Tp-link tapo Tp-link tapo C220 V1 Tp-link tapo C520ws V2 |
Tue, 27 Jan 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 27 Jan 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | By sending crafted files to the firmware update endpoint of Tapo C220 v1 and C520WS v2, the device terminates core system services before verifying authentication or firmware integrity. An unauthenticated attacker can trigger a persistent denial of service, requiring a manual reboot or application initiated restart to restore normal device operation. | |
| Title | Unauthenticated Denial of Service via Firmware Update Endpoint on TP-Link Tapo C220 & C520WS | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2026-01-27T18:11:48.097Z
Reserved: 2026-01-21T23:01:34.738Z
Link: CVE-2026-1315
Updated: 2026-01-27T18:11:39.389Z
Status : Analyzed
Published: 2026-01-27T18:15:55.257
Modified: 2026-03-11T22:19:43.510
Link: CVE-2026-1315
No data.
OpenCVE Enrichment
Updated: 2026-01-28T12:21:57Z