Description


The HTTPS server on Tapo C200 V3 does not properly validate the Content-Length header, which can lead to an integer overflow. An unauthenticated attacker on the same local network segment can send crafted HTTPS requests to trigger excessive memory allocation, causing the device to crash and resulting in denial-of-service (DoS).

Related CPE's


Could not find any relations

Weaknesses



CWE-770

CVSS impact metrics


Missing metrics for CVSS V

  • CVSS V3.1

  • CVSS V3.0

  • CVSS V2.0

Information


Source identifier

f23511db-6c3e-4e32-a477-6aa17d310630

Vulnerability status

Received

Published

2025-12-20T01:16:02.670

3 hours ago

Last modified

2025-12-20T01:16:02.670

3 hours ago