Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14299: CWE-770 Allocation of Resources Without Limits or Throttling in TP-Link Systems Inc. Tapo C200 V3

0
High
VulnerabilityCVE-2025-14299cvecve-2025-14299cwe-770
Published: Sat Dec 20 2025 (12/20/2025, 00:42:43 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link Systems Inc.
Product: Tapo C200 V3

Description

The HTTPS server on Tapo C200 V3 does not properly validate the Content-Length header, which can lead to an integer overflow. An unauthenticated attacker on the same local network segment can send crafted HTTPS requests to trigger excessive memory allocation, causing the device to crash and resulting in denial-of-service (DoS).

AI-Powered Analysis

AILast updated: 12/27/2025, 04:27:03 UTC

Technical Analysis

CVE-2025-14299 is a vulnerability in the HTTPS server implementation of the TP-Link Tapo C200 V3 smart camera. The root cause is improper validation of the Content-Length HTTP header, which can lead to an integer overflow during request processing. When an attacker crafts a malicious HTTPS request with a manipulated Content-Length value, the device attempts to allocate an excessive amount of memory. This uncontrolled allocation exhausts system resources, causing the device to crash and become unavailable, resulting in a denial-of-service (DoS) condition. The vulnerability requires no authentication or user interaction and can be exploited by an attacker positioned on the same local network segment as the device, such as within a compromised Wi-Fi network. The vulnerability is classified under CWE-770, which relates to allocation of resources without limits or throttling, highlighting the lack of safeguards in the device's memory management. The CVSS v4.0 base score is 7.1, reflecting high severity primarily due to the ease of exploitation and the impact on availability. No patches or known exploits have been reported at the time of publication, but the risk remains significant given the widespread use of TP-Link devices in home and small business environments. The vulnerability could be leveraged to disrupt surveillance and security monitoring capabilities, particularly in environments relying on these cameras for physical security.

Potential Impact

For European organizations, the primary impact of CVE-2025-14299 is the potential disruption of security monitoring and surveillance systems that utilize the Tapo C200 V3 cameras. A successful exploit can cause device crashes and denial-of-service, leading to gaps in video coverage and reduced situational awareness. This can affect physical security, compliance with regulatory requirements for surveillance, and incident response capabilities. Organizations in sectors such as critical infrastructure, government facilities, healthcare, and finance, where continuous monitoring is essential, may experience operational risks and increased vulnerability to physical intrusions. Additionally, the requirement for an attacker to be on the same local network segment means that compromised internal networks or guest Wi-Fi access points could be leveraged to exploit this vulnerability. The lack of authentication and user interaction requirements increases the risk of automated or opportunistic attacks within local networks. The absence of a patch at the time of disclosure necessitates interim protective measures to mitigate potential exploitation.

Mitigation Recommendations

1. Network Segmentation: Isolate Tapo C200 V3 devices on dedicated VLANs or network segments with strict access controls to limit exposure to untrusted devices and users. 2. Access Control: Restrict local network access to the cameras by implementing MAC filtering, WPA3 encryption, and strong Wi-Fi passwords to reduce the risk of unauthorized local attackers. 3. Monitoring and Detection: Deploy network monitoring tools to detect unusual HTTPS traffic patterns or repeated malformed requests targeting the cameras. 4. Device Hardening: Disable unnecessary services and interfaces on the cameras if configurable, reducing the attack surface. 5. Vendor Engagement: Maintain communication with TP-Link for timely updates and patches; apply firmware updates promptly once available. 6. Incident Response Planning: Prepare for potential DoS incidents by having backup surveillance options and rapid device replacement strategies. 7. Physical Security: Complement network security with physical controls to prevent unauthorized access to local networks where cameras are deployed. These measures go beyond generic advice by focusing on network architecture and operational controls tailored to the specific exploitation vector of this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
TPLink
Date Reserved
2025-12-08T22:05:00.941Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6945fa2fc376abdb7e67a371

Added to database: 12/20/2025, 1:21:51 AM

Last enriched: 12/27/2025, 4:27:03 AM

Last updated: 2/4/2026, 7:32:30 PM

Views: 121

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats