Unrated severityNVD Advisory· Published Dec 20, 2025· Updated Dec 22, 2025
Improper Content-Length Validation in HTTPS Requests on Tapo C200
CVE-2025-14299
Description
The HTTPS server on Tapo C200 V3 does not properly validate the Content-Length header, which can lead to an integer overflow. An unauthenticated attacker on the same local network segment can send crafted HTTPS requests to trigger excessive memory allocation, causing the device to crash and resulting in denial-of-service (DoS).
Affected products
2- TP-Link Systems Inc./Tapo C200 V3v5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.