CVE-2025-14299

EUVD-2025-204620
The HTTPS server on Tapo C200 V3 does not properly validate the Content-Length header, which can lead to an integer overflow. An unauthenticated attacker on the same local network segment can send crafted HTTPS requests to trigger excessive memory allocation, causing the device to crash and resulting in denial-of-service (DoS).
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.5 MEDIUM
ADJACENT_NETWORK
LOW
NONE
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 18%
Affected Products (NVD)
VendorProductVersion
tp-linktapo_c200_firmware
1.3.3:build_230228
tp-linktapo_c200_firmware
1.3.4:build_230424
tp-linktapo_c200_firmware
1.3.5:build_230717
tp-linktapo_c200_firmware
1.3.7:build_230920
tp-linktapo_c200_firmware
1.3.9:build_231019
tp-linktapo_c200_firmware
1.3.11:build_231115
tp-linktapo_c200_firmware
1.3.13:build_240327
tp-linktapo_c200_firmware
1.3.14:build_240513
tp-linktapo_c200_firmware
1.3.15:build_240715
tp-linktapo_c200_firmware
1.4.1:build_241212
tp-linktapo_c200_firmware
1.4.2:build_250313
tp-linktapo_c200_firmware
1.4.4:build_250922
𝑥
= Vulnerable software versions