Home

Description

The HTTPS service on Tapo C200 V3 exposes a connectAP interface without proper authentication. An unauthenticated attacker on the same local network segment can exploit this to modify the device’s Wi-Fi configuration, resulting in loss of connectivity and denial-of-service (DoS).

PUBLISHED Reserved 2025-12-08 | Published 2025-12-20 | Updated 2025-12-22 | Assigner TPLink




HIGH: 8.7CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-306 Missing Authentication for Critical Function

Product status

Default status
unaffected

Any version before C200(US)_V3_1.4.5 Build 251104
affected

Credits

Simone Margaritelli (evilsocket) finder

References

www.tp-link.com/us/support/download/tapo-c200/v3/

www.tp-link.com/us/support/faq/4849/

cve.org (CVE-2025-14300)

nvd.nist.gov (CVE-2025-14300)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.