CVE-2026-34121
Received Received - Intake
Authentication Bypass in TP-Link Tapo C520WS DS Configuration Service

Publication date: 2026-04-02

Last updated on: 2026-04-06

Assigner: TPLink

Description
An authentication bypass vulnerability within the HTTP handling of the DS configuration service in TP-Link Tapo C520WS v2.6 was identified, due to inconsistent parsing and authorization logic in JSON requests during authentication check. An unauthenticated attacker can append an authentication-exempt action to a request containing privileged DS do actions, bypassing authorization checks. Successful exploitation allows unauthenticated execution of restricted configuration actions, which may result in unauthorized modification of device state.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-02
Last Modified
2026-04-06
Generated
2026-05-07
AI Q&A
2026-04-02
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
tp-link tapo_c520ws_firmware to 1.2.4 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-287 When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an authentication bypass issue in the HTTP handling of the DS configuration service in TP-Link Tapo C520WS version 2.6. It occurs because of inconsistent parsing and authorization logic in JSON requests during the authentication check.

An unauthenticated attacker can exploit this by appending an authentication-exempt action to a request that contains privileged DS do actions, effectively bypassing the authorization checks.


How can this vulnerability impact me? :

Successful exploitation of this vulnerability allows an unauthenticated attacker to execute restricted configuration actions on the device.

This may result in unauthorized modification of the device state, potentially compromising the device's security and functionality.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart