Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 27 Jan 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 27 Jan 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | By sending crafted files to the firmware update endpoint of Tapo C220 v1 and C520WS v2, the device terminates core system services before verifying authentication or firmware integrity. An unauthenticated attacker can trigger a persistent denial of service, requiring a manual reboot or application initiated restart to restore normal device operation. | |
| Title | Unauthenticated Denial of Service via Firmware Update Endpoint on TP-Link Tapo C220 & C520WS | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2026-01-27T18:11:48.097Z
Reserved: 2026-01-21T23:01:34.738Z
Link: CVE-2026-1315
Updated: 2026-01-27T18:11:39.389Z
Status : Received
Published: 2026-01-27T18:15:55.257
Modified: 2026-01-27T18:15:55.257
Link: CVE-2026-1315
No data.
OpenCVE Enrichment
No data.