HIGH · 7.5

CVE-2026-0918

The Tapo C100 v5, C220 v1 and C520WS v2 cameras’ HTTP service does not safely handle POST requests containing an excessively large Content-Length header. The resulting failed memory allocation trigger...

Vulnerability Description

The Tapo C100 v5, C220 v1 and C520WS v2 cameras’ HTTP service does not safely handle POST requests containing an excessively large Content-Length header. The resulting failed memory allocation triggers a NULL pointer dereference, causing the main service process to crash. An unauthenticated attacker can repeatedly crash the service, causing temporary denial of service. The device restarts automatically, and repeated requests can keep it unavailable.

CVSS Score

7.5

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
Tp-LinkTapo C220 Firmware< 1.4.2
Tp-LinkTapo C2201
Tp-LinkTapo C520Ws Firmware< 1.2.3
Tp-LinkTapo C520Ws2

Related Weaknesses (CWE)

References

FAQ

What is CVE-2026-0918?

CVE-2026-0918 is a vulnerability with a CVSS score of 7.5 (HIGH). The Tapo C100 v5, C220 v1 and C520WS v2 cameras’ HTTP service does not safely handle POST requests containing an excessively large Content-Length header. The resulting failed memory allocation trigger...

How severe is CVE-2026-0918?

CVE-2026-0918 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2026-0918?

Check the references section above for vendor advisories and patch information. Affected products include: Tp-Link Tapo C220 Firmware, Tp-Link Tapo C220, Tp-Link Tapo C520Ws Firmware, Tp-Link Tapo C520Ws.