{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-1315","assignerOrgId":"f23511db-6c3e-4e32-a477-6aa17d310630","state":"PUBLISHED","assignerShortName":"TPLink","dateReserved":"2026-01-21T23:01:34.738Z","datePublished":"2026-01-27T17:53:29.242Z","dateUpdated":"2026-01-27T18:11:48.097Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","modules":["http service"],"product":"Tapo C220 v1","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.4.2 Build 251112","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"Tapo C520WS v2","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.2.3 Build 251114","status":"affected","version":"0","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","value":"Diogo Almeida @NeWbie"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"By sending crafted files to the firmware update endpoint&nbsp;of Tapo C220 v1 and C520WS v2, the device terminates core system services before verifying authentication or firmware integrity.&nbsp;An unauthenticated attacker can trigger a persistent denial of service, requiring a manual reboot or application initiated restart to restore normal device operation."}],"value":"By sending crafted files to the firmware update endpoint of Tapo C220 v1 and C520WS v2, the device terminates core system services before verifying authentication or firmware integrity. An unauthenticated attacker can trigger a persistent denial of service, requiring a manual reboot or application initiated restart to restore normal device operation."}],"impacts":[{"capecId":"CAPEC-23","descriptions":[{"lang":"en","value":"CAPEC-23 File Content Injection"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"ADJACENT","baseScore":7.1,"baseSeverity":"HIGH","exploitMaturity":"NOT_DEFINED","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20 Improper Input Validation","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"f23511db-6c3e-4e32-a477-6aa17d310630","shortName":"TPLink","dateUpdated":"2026-01-27T17:53:29.242Z"},"references":[{"tags":["patch"],"url":"https://www.tp-link.com/us/support/download/tapo-c220/v1.60/"},{"tags":["patch"],"url":"https://www.tp-link.com/en/support/download/tapo-c220/v1/"},{"tags":["patch"],"url":"https://www.tp-link.com/us/support/download/tapo-c520ws/v2/"},{"tags":["patch"],"url":"https://www.tp-link.com/en/support/download/tapo-c520ws/v2/"},{"tags":["vendor-advisory"],"url":"https://www.tp-link.com/us/support/faq/4923/"}],"source":{"discovery":"UNKNOWN"},"title":"Unauthenticated Denial of Service via Firmware Update Endpoint on TP-Link Tapo C220 & C520WS","x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-27T18:11:29.682513Z","id":"CVE-2026-1315","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-27T18:11:48.097Z"}}]}}