The HTTPS service on Tapo C200 V3 exposes a connectAP interface without proper authentication. An unauthenticated attacker on the same local network segment can exploit this to modify the device’s Wi-Fi configuration, resulting in loss of connectivity and denial-of-service (DoS).
References
| Link | Resource |
|---|---|
| https://www.tp-link.com/us/support/download/tapo-c200/v3/#Firmware-Release-Notes | Release Notes |
| https://www.tp-link.com/us/support/faq/4849/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-12-20 01:16
Updated : 2026-01-08 19:38
NVD link : CVE-2025-14300
Mitre link : CVE-2025-14300
CVE.ORG link : CVE-2025-14300
JSON object : View
Products Affected
tp-link
- tapo_c200
- tapo_c200_firmware
CWE
CWE-306
Missing Authentication for Critical Function
