Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0919: CWE-20 Improper Input Validation in TP-Link Systems Inc. Tapo C220 v1

0
High
VulnerabilityCVE-2026-0919cvecve-2026-0919cwe-20
Published: Tue Jan 27 2026 (01/27/2026, 17:52:39 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link Systems Inc.
Product: Tapo C220 v1

Description

The HTTP parser of Tapo C220 v1 and C520WS v2 cameras improperly handles requests containing an excessively long URL path. An invalid‑URL error path continues into cleanup code that assumes allocated buffers exist, leading to a crash and service restart. An unauthenticated attacker can force repeated service crashes or device reboots, causing denial of service.

AI-Powered Analysis

AILast updated: 01/27/2026, 18:20:33 UTC

Technical Analysis

CVE-2026-0919 is a vulnerability classified under CWE-20 (Improper Input Validation) affecting TP-Link Tapo C220 v1 and C520WS v2 IP cameras. The root cause lies in the HTTP parser component, which fails to properly handle requests containing excessively long URL paths. When such a malformed request is received, the parser triggers an invalid-URL error path that proceeds into cleanup code. This cleanup code incorrectly assumes that certain buffers have been allocated, but due to the malformed input, these buffers may not exist, leading to a null pointer dereference or similar memory access violation. The consequence is a crash of the HTTP service on the device, which then causes the device to reboot or restart the service repeatedly. Because the vulnerability can be triggered by unauthenticated attackers remotely over the network without any user interaction, it poses a significant risk of denial of service (DoS). The CVSS 4.0 vector indicates an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a high impact on availability (VA:H). No known exploits have been reported in the wild as of the publication date. The affected versions are indicated as '0', which likely means the initial or all versions prior to a patch. No patch links are currently provided, suggesting that a fix may be pending or not yet publicly available. This vulnerability could be leveraged by attackers to disrupt surveillance operations, potentially impacting security monitoring and incident response capabilities.

Potential Impact

For European organizations, the primary impact of CVE-2026-0919 is denial of service on affected TP-Link Tapo cameras, which are commonly used for physical security and monitoring. Disruption of these devices can lead to blind spots in surveillance coverage, increasing the risk of undetected intrusions or safety incidents. Critical infrastructure operators, government facilities, and enterprises relying on these cameras for security could face operational interruptions and increased exposure to physical security threats. The vulnerability's ease of exploitation without authentication means attackers can launch DoS attacks remotely, potentially as part of larger coordinated campaigns. Additionally, repeated device reboots may degrade hardware lifespan or cause cascading failures in integrated security systems. While confidentiality and integrity impacts are not indicated, availability degradation alone can have severe consequences in security-sensitive environments. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as exploit code could emerge. Organizations with large deployments of TP-Link Tapo cameras or those in sectors such as transportation, energy, and public safety are particularly vulnerable.

Mitigation Recommendations

Given the absence of an official patch at the time of this report, European organizations should implement network-level mitigations to reduce exposure. These include deploying web application firewalls (WAFs) or intrusion prevention systems (IPS) configured to detect and block HTTP requests with abnormally long URL paths targeting camera IP addresses. Network segmentation should isolate IP cameras from general user networks and restrict access to trusted management hosts only. Monitoring network traffic for repeated malformed requests or device reboots can provide early warning of exploitation attempts. Organizations should engage with TP-Link for firmware updates and apply patches promptly once available. Additionally, consider disabling remote HTTP access to cameras if not required or replacing vulnerable models with devices from vendors with robust security update practices. Regularly auditing device firmware versions and maintaining an asset inventory will help track vulnerable devices. Finally, incorporating these devices into broader security incident and event management (SIEM) systems can improve detection and response capabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
TPLink
Date Reserved
2026-01-13T19:44:02.718Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6978fe854623b1157c3c22e8

Added to database: 1/27/2026, 6:05:57 PM

Last enriched: 1/27/2026, 6:20:33 PM

Last updated: 2/7/2026, 4:58:11 PM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats