CVE-2025-14300

EUVD-2025-204619
The HTTPS service on Tapo C200 V3 exposes a connectAP interface without proper authentication. An unauthenticated attacker on the same local network segment can exploit this to modify the device’s Wi-Fi configuration, resulting in loss of connectivity and denial-of-service (DoS).
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.1 HIGH
ADJACENT_NETWORK
LOW
NONE
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 26%
Affected Products (NVD)
VendorProductVersion
tp-linktapo_c200_firmware
1.3.3:build_230228
tp-linktapo_c200_firmware
1.3.4:build_230424
tp-linktapo_c200_firmware
1.3.5:build_230717
tp-linktapo_c200_firmware
1.3.7:build_230920
tp-linktapo_c200_firmware
1.3.9:build_231019
tp-linktapo_c200_firmware
1.3.11:build_231115
tp-linktapo_c200_firmware
1.3.13:build_240327
tp-linktapo_c200_firmware
1.3.14:build_240513
tp-linktapo_c200_firmware
1.3.15:build_240715
tp-linktapo_c200_firmware
1.4.1:build_241212
tp-linktapo_c200_firmware
1.4.2:build_250313
tp-linktapo_c200_firmware
1.4.4:build_250922
𝑥
= Vulnerable software versions