Cyber Posture

CVE-2026-0919

High

Published: 27 January 2026

Published
27 January 2026
Modified
11 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0015 34.9th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-0919 is a high-severity Improper Input Validation (CWE-20) vulnerability in Tp-Link Tapo C220 Firmware. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 34.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Application or System Exploitation (T1499.004).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-20

Security testing and developer training directly verify and enforce proper input validation, reducing exploitability of injection and malformed-data weaknesses.

addresses: CWE-20

Security testing and evaluation at multiple SDLC stages directly detects missing or flawed input validation, with the required remediation process ensuring fixes are applied.

addresses: CWE-20

Directly implements checks on information inputs to reject invalid data before processing.

addresses: CWE-20

Spam protection mechanisms perform filtering and detection on inbound/outbound messages, directly compensating for missing or weak input validation of unsolicited content.

MITRE ATT&CK Enterprise TechniquesAI

T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Direct mapping to application/system exploitation causing service crash and DoS via crafted network input.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The HTTP parser of Tapo C220 v1 and C520WS v2 cameras improperly handles requests containing an excessively long URL path. An invalid‑URL error path continues into cleanup code that assumes allocated buffers exist, leading to a crash and service restart.…

more

An unauthenticated attacker can force repeated service crashes or device reboots, causing denial of service.

Deeper analysisAI

CVE-2026-0919 is a vulnerability in the HTTP parser of TP-Link Tapo C220 v1 and C520WS v2 cameras. The parser improperly handles HTTP requests containing an excessively long URL path, causing an invalid-URL error path to continue into cleanup code that assumes allocated buffers exist. This results in a crash and automatic service restart. The issue is classified under CWE-20 (Improper Input Validation) with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

An unauthenticated attacker can exploit this vulnerability over the network with low attack complexity and no user interaction or privileges required. By sending crafted requests with excessively long URL paths, the attacker can trigger repeated service crashes or device reboots, resulting in a denial-of-service condition that disrupts camera functionality.

TP-Link support pages provide firmware downloads for mitigation, including resources for Tapo C220 v1 (such as v1.60) and C520WS v2 at locations like https://www.tp-link.com/en/support/download/tapo-c220/v1/, https://www.tp-link.com/en/support/download/tapo-c520ws/v2/, https://www.tp-link.com/us/support/download/tapo-c220/v1.60/, and https://www.tp-link.com/us/support/download/tapo-c520ws/v2/. An FAQ at https://www.tp-link.com/us/support/faq/4923/ offers additional guidance.

Details

CWE(s)

Affected Products

tp-link
tapo c220 firmware
≤ 1.4.2
tp-link
tapo c520ws firmware
≤ 1.2.3

CVEs Like This One

CVE-2026-1315Same product: Tp-Link Tapo C220
CVE-2026-0918Same product: Tp-Link Tapo C220
CVE-2025-15606Same vendor: Tp-Link
CVE-2025-15035Same vendor: Tp-Link
CVE-2026-34121Same product: Tp-Link Tapo C520Ws
CVE-2025-9014Same vendor: Tp-Link
CVE-2026-27623Shared CWE-20
CVE-2025-61614Shared CWE-20
CVE-2025-69278Shared CWE-20
CVE-2026-28894Shared CWE-20

References