High severity7.5NVD Advisory· Published Jan 27, 2026· Updated Apr 29, 2026
CVE-2026-0919
CVE-2026-0919
Description
The HTTP parser of Tapo C210 v3, C220 v1 and C520WS v2 cameras improperly handles requests containing an excessively long URL path. An invalid‑URL error path continues into cleanup code that assumes allocated buffers exist, leading to a crash and service restart. An unauthenticated attacker can force repeated service crashes or device reboots, causing denial of service.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- www.tp-link.com/us/support/faq/4923/nvdVendor Advisory
- www.tp-link.com/en/support/download/tapo-c220/v1/nvdProduct
- www.tp-link.com/en/support/download/tapo-c520ws/v2/nvdProduct
- www.tp-link.com/us/support/download/tapo-c220/v1.60/nvdProduct
- www.tp-link.com/us/support/download/tapo-c520ws/v2/nvdProduct
- www.tp-link.com/en/support/download/tapo-c210/v3/nvd
- www.tp-link.com/us/support/download/tapo-c210/v3/nvd
News mentions
0No linked articles in our index yet.