Description
The HTTPS server on Tapo C200 V3 does not properly validate the Content-Length header, which can lead to an integer overflow. An unauthenticated attacker on the same local network segment can send crafted HTTPS requests to trigger excessive memory allocation, causing the device to crash and resulting in denial-of-service (DoS).
Related CPE's
Could not find any relations
References
CVSS impact metrics
Missing metrics for CVSS V
CVSS V3.1
CVSS V3.0
CVSS V2.0
Information
Source identifier
f23511db-6c3e-4e32-a477-6aa17d310630
Vulnerability status
Received
Published
2025-12-20T01:16:02.670
3 hours agoLast modified
2025-12-20T01:16:02.670
3 hours ago