The HTTPS server on Tapo C200 V3 does not properly validate the Content-Length header, which can lead to an integer overflow. An unauthenticated attacker on the same local network segment can send crafted HTTPS requests to trigger excessive memory allocation, causing the device to crash and resulting in denial-of-service (DoS).
History

Mon, 22 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 21 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link
Tp-link tapo
Tp-link tapo C200
Tp-link tapo C200 V3
Vendors & Products Tp-link
Tp-link tapo
Tp-link tapo C200
Tp-link tapo C200 V3

Sat, 20 Dec 2025 01:15:00 +0000

Type Values Removed Values Added
Description The HTTPS server on Tapo C200 V3 does not properly validate the Content-Length header, which can lead to an integer overflow. An unauthenticated attacker on the same local network segment can send crafted HTTPS requests to trigger excessive memory allocation, causing the device to crash and resulting in denial-of-service (DoS).
Title Improper Content-Length Validation in HTTPS Requests on Tapo C200
Weaknesses CWE-770
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published: 2025-12-20T00:42:43.806Z

Updated: 2025-12-22T16:08:54.736Z

Reserved: 2025-12-08T22:05:00.941Z

Link: CVE-2025-14299

cve-icon Vulnrichment

Updated: 2025-12-22T16:08:50.751Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-20T01:16:02.670

Modified: 2025-12-23T14:51:52.650

Link: CVE-2025-14299

cve-icon Redhat

No data.