Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8065: CWE-400 Uncontrolled Resource Consumption in TP-Link Systems Inc. Tapo C200 V3

0
High
VulnerabilityCVE-2025-8065cvecve-2025-8065cwe-400
Published: Sat Dec 20 2025 (12/20/2025, 00:41:56 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link Systems Inc.
Product: Tapo C200 V3

Description

A buffer overflow vulnerability exists in the ONVIF XML parser of Tapo C200 V3. An unauthenticated attacker on the same local network segment can send specially crafted SOAP XML requests, causing memory overflow and device crash, resulting in denial-of-service (DoS).

AI-Powered Analysis

AILast updated: 12/27/2025, 04:27:55 UTC

Technical Analysis

CVE-2025-8065 is a buffer overflow vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) found in the ONVIF XML parser component of the TP-Link Tapo C200 V3 IP camera. The vulnerability allows an unauthenticated attacker on the same local network segment to send specially crafted SOAP XML requests that overflow memory buffers within the device's ONVIF service. This overflow leads to a crash of the device, effectively causing a denial-of-service (DoS) condition. The attack vector requires no authentication, no user interaction, and can be executed remotely but only from within the local network segment, limiting the attack surface to internal or compromised networks. The vulnerability affects the device's availability by causing it to become unresponsive or reboot, disrupting surveillance and monitoring capabilities. The CVSS 4.0 base score is 7.1, reflecting a high severity due to ease of exploitation (low attack complexity), no privileges required, and a significant impact on availability. No patches or fixes have been released at the time of publication, and no known exploits have been observed in the wild. The vulnerability stems from improper input validation and memory management in the ONVIF XML parser, which is responsible for handling SOAP requests used for device management and control. This flaw could be exploited by attackers who have gained access to the local network, such as through compromised Wi-Fi or insider threats. The lack of authentication requirements increases the risk within trusted network environments. Given the widespread use of TP-Link Tapo cameras in consumer and small business environments, this vulnerability could be leveraged to disrupt security monitoring systems.

Potential Impact

For European organizations, the primary impact of CVE-2025-8065 is the disruption of surveillance and security monitoring due to denial-of-service conditions on affected Tapo C200 V3 cameras. This can lead to gaps in physical security coverage, increasing the risk of undetected intrusions or incidents. Organizations relying on these cameras for perimeter security, access control, or critical infrastructure monitoring may experience operational interruptions. The vulnerability could be exploited by attackers who have local network access, including malicious insiders or attackers who have compromised internal Wi-Fi networks. This risk is heightened in environments with lax network segmentation or insufficient access controls. Additionally, repeated exploitation could cause device instability or require manual resets, increasing maintenance overhead. While confidentiality and integrity are not directly impacted, the availability impact is significant for security operations. The lack of patches means organizations must rely on network-level mitigations until a vendor fix is available. The threat is particularly relevant for sectors with high security requirements such as government facilities, transportation hubs, healthcare, and critical infrastructure within Europe.

Mitigation Recommendations

To mitigate CVE-2025-8065, European organizations should implement strict network segmentation to isolate IP cameras from general user networks and untrusted devices. Limit access to the local network segment where Tapo C200 V3 cameras reside by enforcing strong Wi-Fi security (WPA3 where possible) and using VLANs or separate physical networks. Employ network access control (NAC) solutions to restrict which devices can communicate with the cameras. Monitor network traffic for unusual or malformed SOAP XML requests targeting ONVIF services, using intrusion detection/prevention systems (IDS/IPS) with custom signatures. Disable ONVIF services if not required or restrict ONVIF access to trusted management hosts only. Regularly audit device firmware versions and subscribe to vendor advisories for patch availability. In environments where cameras are critical, consider deploying fallback or redundant monitoring solutions to maintain coverage during potential DoS events. Educate network administrators about the risks of local network exposure and enforce strong internal security policies. Finally, prepare incident response plans for rapid recovery from device crashes or network disruptions caused by exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
TPLink
Date Reserved
2025-07-22T21:23:25.432Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6945fa2fc376abdb7e67a379

Added to database: 12/20/2025, 1:21:51 AM

Last enriched: 12/27/2025, 4:27:55 AM

Last updated: 2/7/2026, 12:57:05 PM

Views: 110

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats