CVE-2025-8065

EUVD-2025-204621
A stack-based buffer overflow vulnerability was identified in the ONVIF SOAP XML Parser in Tapo C200 v3 and C520WS v2.6. When processing XML tags with namespace prefixes, the parser fails to validate the prefix length before copying it to a fixed-size stack buffer.  It allowed a crafted SOAP request with an oversized namespace prefix to cause memory corruption in stack. 

An unauthenticated attacker on the same local network may exploit this flaw to enable remote code execution with elevated privileges, leading to full compromise of the device.
Classic Buffer Overflow
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.5 MEDIUM
ADJACENT_NETWORK
LOW
NONE
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Affected Products (NVD)
VendorProductVersion
tp-linktapo_c200_firmware
1.3.3:build_230228
tp-linktapo_c200_firmware
1.3.4:build_230424
tp-linktapo_c200_firmware
1.3.5:build_230717
tp-linktapo_c200_firmware
1.3.7:build_230920
tp-linktapo_c200_firmware
1.3.9:build_231019
tp-linktapo_c200_firmware
1.3.11:build_231115
tp-linktapo_c200_firmware
1.3.13:build_240327
tp-linktapo_c200_firmware
1.3.14:build_240513
tp-linktapo_c200_firmware
1.3.15:build_240715
tp-linktapo_c200_firmware
1.4.1:build_241212
tp-linktapo_c200_firmware
1.4.2:build_250313
tp-linktapo_c200_firmware
1.4.4:build_250922
𝑥
= Vulnerable software versions