Cyber Posture

CVE-2026-1315

High

Published: 27 January 2026

Published
27 January 2026
Modified
11 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0014 33.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-1315 is a high-severity Improper Input Validation (CWE-20) vulnerability in Tp-Link Tapo C220 Firmware. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 33.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-20

Security testing and developer training directly verify and enforce proper input validation, reducing exploitability of injection and malformed-data weaknesses.

addresses: CWE-20

Security testing and evaluation at multiple SDLC stages directly detects missing or flawed input validation, with the required remediation process ensuring fixes are applied.

addresses: CWE-20

Directly implements checks on information inputs to reject invalid data before processing.

addresses: CWE-20

Spam protection mechanisms perform filtering and detection on inbound/outbound messages, directly compensating for missing or weak input validation of unsolicited content.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1499 Endpoint Denial of Service Impact
Adversaries may perform Endpoint Denial of Service (DoS) attacks to degrade or block the availability of services to users.
Why these techniques?

Vulnerability in unauthenticated firmware update endpoint directly enables remote exploitation of a public-facing service (T1190) to trigger service termination and persistent endpoint DoS (T1499).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

By sending crafted files to the firmware update endpoint of Tapo C220 v1 and C520WS v2, the device terminates core system services before verifying authentication or firmware integrity. An unauthenticated attacker can trigger a persistent denial of service, requiring a…

more

manual reboot or application initiated restart to restore normal device operation.

Deeper analysisAI

CVE-2026-1315 is a vulnerability in the firmware update endpoint of TP-Link Tapo C220 v1 and C520WS v2 devices. By sending crafted files to this endpoint, an attacker can cause the device to terminate core system services before verifying authentication or firmware integrity. The issue, published on 2026-01-27 and associated with CWE-20 (Improper Input Validation), carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating high availability impact with no confidentiality or integrity effects.

An unauthenticated attacker with network access can exploit the vulnerability by transmitting specially crafted files to the firmware update endpoint. This triggers a persistent denial-of-service condition, halting normal device operation until a manual reboot or application-initiated restart is performed.

TP-Link provides firmware downloads for mitigation on support pages for the affected models, including https://www.tp-link.com/en/support/download/tapo-c220/v1/, https://www.tp-link.com/en/support/download/tapo-c520ws/v2/, https://www.tp-link.com/us/support/download/tapo-c220/v1.60/, https://www.tp-link.com/us/support/download/tapo-c520ws/v2/, and an FAQ at https://www.tp-link.com/us/support/faq/4923/. Security practitioners should apply these updates to vulnerable devices.

Details

CWE(s)

Affected Products

tp-link
tapo c220 firmware
≤ 1.4.2
tp-link
tapo c520ws firmware
≤ 1.2.3

CVEs Like This One

CVE-2026-0919Same product: Tp-Link Tapo C220
CVE-2026-0918Same product: Tp-Link Tapo C220
CVE-2026-34121Same product: Tp-Link Tapo C520Ws
CVE-2025-15606Same vendor: Tp-Link
CVE-2025-15035Same vendor: Tp-Link
CVE-2026-1668Same vendor: Tp-Link
CVE-2025-9014Same vendor: Tp-Link
CVE-2025-25897Same vendor: Tp-Link
CVE-2025-15517Same vendor: Tp-Link
CVE-2025-9292Same vendor: Tp-Link

References