TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2026-1315

HIGH
7.5

Beschreibung

By sending crafted files to the firmware update endpoint of Tapo C220 v1 and C520WS v2, the device terminates core system services before verifying authentication or firmware integrity. An unauthenticated attacker can trigger a persistent denial of service, requiring a manual reboot or application initiated restart to restore normal device operation.

CVE Details

CVSS v3.1 Bewertung7.5
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht1/27/2026
Zuletzt geandert3/11/2026
Quellenvd
Honeypot-Sichtungen0

Betroffene Produkte

tp-link:tapo_c220tp-link:tapo_c220_firmwaretp-link:tapo_c520wstp-link:tapo_c520ws_firmware

Schwachen (CWE)

CWE-20

Referenzen

https://www.tp-link.com/en/support/download/tapo-c220/v1/(f23511db-6c3e-4e32-a477-6aa17d310630)
https://www.tp-link.com/us/support/faq/4923/(f23511db-6c3e-4e32-a477-6aa17d310630)

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.