Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14300: CWE-306 Missing Authentication for Critical Function in TP-Link Systems Inc. Tapo C200 V3

0
High
VulnerabilityCVE-2025-14300cvecve-2025-14300cwe-306
Published: Sat Dec 20 2025 (12/20/2025, 00:43:39 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link Systems Inc.
Product: Tapo C200 V3

Description

The HTTPS service on Tapo C200 V3 exposes a connectAP interface without proper authentication. An unauthenticated attacker on the same local network segment can exploit this to modify the device’s Wi-Fi configuration, resulting in loss of connectivity and denial-of-service (DoS).

AI-Powered Analysis

AILast updated: 12/27/2025, 04:27:15 UTC

Technical Analysis

CVE-2025-14300 identifies a critical authentication bypass vulnerability in the TP-Link Tapo C200 V3 smart camera. The device's HTTPS service exposes a connectAP interface that lacks proper authentication controls, classified under CWE-306 (Missing Authentication for Critical Function). An attacker located on the same local network segment can access this interface without credentials and alter the device's Wi-Fi configuration. This manipulation can disconnect the device from the network, effectively causing a denial-of-service (DoS) condition. The vulnerability does not require any privileges or user interaction, making it relatively easy to exploit for anyone with local network access. The CVSS 4.0 score of 8.7 reflects high severity, with attack vector being adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact covers confidentiality, integrity, and availability, with a strong emphasis on availability due to potential DoS. Although no public exploits have been reported, the vulnerability poses a significant risk to environments relying on these cameras for security or monitoring. The lack of authentication on a critical function is a fundamental security design flaw. No patches have been released yet, increasing the urgency for interim mitigations. The vulnerability affects version 0 of the product, presumably the initial or current firmware version. Given the device's use in home and enterprise settings, the threat surface includes both consumer and organizational networks.

Potential Impact

For European organizations, this vulnerability can disrupt surveillance and monitoring operations by causing denial-of-service on Tapo C200 V3 cameras. Critical infrastructure, corporate offices, and public sector facilities using these devices may experience security blind spots, increasing risk exposure. The ability for unauthenticated attackers on the local network to alter Wi-Fi settings could also facilitate lateral movement or network segmentation bypass if attackers reposition the device onto rogue networks. This could degrade network integrity and availability, impacting operational continuity. In environments with multiple cameras, coordinated exploitation could lead to widespread outages. Additionally, loss of camera connectivity may delay incident detection and response. The vulnerability's exploitation does not require sophisticated skills, making it accessible to a broad range of attackers. The absence of a patch means organizations must rely on network controls and monitoring to mitigate risk. The impact is particularly severe in sectors with high reliance on physical security and surveillance, such as transportation hubs, government buildings, and critical infrastructure in Europe.

Mitigation Recommendations

1. Immediately segment networks to isolate Tapo C200 V3 devices from general user and guest networks, limiting local network access to trusted administrators only. 2. Disable remote management and any unnecessary services on the cameras to reduce exposure. 3. Implement strict wireless network access controls, including strong WPA3 encryption and network access control (NAC) to prevent unauthorized devices from joining the local network segment. 4. Monitor network traffic for unusual configuration changes or device behavior indicative of exploitation attempts. 5. Use VLANs or separate SSIDs to segregate IoT devices from critical business systems. 6. Regularly audit device firmware versions and configurations to identify vulnerable devices. 7. Engage with TP-Link for firmware updates or patches and apply them promptly once available. 8. Consider deploying endpoint detection and response (EDR) solutions capable of detecting anomalous network activity related to IoT devices. 9. Educate network administrators about the vulnerability and the importance of local network security hygiene. 10. If possible, replace vulnerable devices with models that have robust authentication mechanisms.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
TPLink
Date Reserved
2025-12-08T22:05:13.804Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6945fa2fc376abdb7e67a375

Added to database: 12/20/2025, 1:21:51 AM

Last enriched: 12/27/2025, 4:27:15 AM

Last updated: 2/5/2026, 9:53:46 PM

Views: 172

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats