VYPR
Unrated severityNVD Advisory· Published Dec 20, 2025· Updated Dec 22, 2025

Improper Content-Length Validation in HTTPS Requests on Tapo C200

CVE-2025-14299

Description

The HTTPS server on Tapo C200 V3 does not properly validate the Content-Length header, which can lead to an integer overflow. An unauthenticated attacker on the same local network segment can send crafted HTTPS requests to trigger excessive memory allocation, causing the device to crash and resulting in denial-of-service (DoS).

Affected products

2
  • Tapo/C200llm-create
    Range: = V3
  • TP-Link Systems Inc./Tapo C200 V3v5
    Range: 0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.