CVE-2025-14300
The HTTPS service on Tapo C200 V3 exposes a connectAP interface without proper authentication. An unauthenticated attacker on the same local network segment can exploit this to modify the device’s Wi-Fi configuration, resulting in loss of connectivity and denial-of-service (DoS).
Vendor
Product
CWE
Yayın Tarihi
2025-12-20 01:16:03
Güncelleme
2026-04-03 22:16:24
Source Identifier
f23511db-6c3e-4e32-a477-6aa17d310630
KEV Date Added
-
Kategoriler
Referanslar
https://www.tp-link.com/en/support/download/tapo-c100/v5/#Firmware-Release-Notes
https://www.tp-link.com/en/support/download/tapo-c200/v3/#Firmware-Release-Notes
https://www.tp-link.com/us/support/download/tapo-c100/v5/#Firmware-Release-Notes
https://www.tp-link.com/us/support/download/tapo-c200/v3/#Firmware-Release-Notes
https://www.tp-link.com/us/support/faq/4849/