CVE-2025-14300
EUVD-2025-20461920.12.2025, 01:16
The HTTPS service on Tapo C200 V3 exposes a connectAP interface without proper authentication. An unauthenticated attacker on the same local network segment can exploit this to modify the device’s Wi-Fi configuration, resulting in loss of connectivity and denial-of-service (DoS).Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| tp-link | tapo_c200_firmware | 1.3.3:build_230228 |
| tp-link | tapo_c200_firmware | 1.3.4:build_230424 |
| tp-link | tapo_c200_firmware | 1.3.5:build_230717 |
| tp-link | tapo_c200_firmware | 1.3.7:build_230920 |
| tp-link | tapo_c200_firmware | 1.3.9:build_231019 |
| tp-link | tapo_c200_firmware | 1.3.11:build_231115 |
| tp-link | tapo_c200_firmware | 1.3.13:build_240327 |
| tp-link | tapo_c200_firmware | 1.3.14:build_240513 |
| tp-link | tapo_c200_firmware | 1.3.15:build_240715 |
| tp-link | tapo_c200_firmware | 1.4.1:build_241212 |
| tp-link | tapo_c200_firmware | 1.4.2:build_250313 |
| tp-link | tapo_c200_firmware | 1.4.4:build_250922 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration