Description

A stack-based buffer overflow vulnerability was identified in TP-Link Tapo C520WS v2.6 within a configuration handling component due to insufficient input validation. An attacker can exploit this vulnerability by supplying an excessively long value for a vulnerable configuration parameter, resulting in a stack overflow. Successful exploitation results in Denial-of-Service (DoS) condition, leading to a service crash or device reboot, impacting availability.

INFO

Published Date :

2026-04-02T17:20:12.471Z

Last Modified :

2026-04-02T17:59:32.667Z

Source :

TPLink
AFFECTED PRODUCTS

The following products are affected by CVE-2026-34122 vulnerability.

Vendors Products
Tp-link
  • Tapo C520ws
  • Tapo C520ws Firmware
  • Tapo C520ws V2

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact