The flaws tracked as CVE-2026-34118 through CVE-2026-34124 range from heap and stack-based buffer overflows to a critical authentication bypass, all of which can be exploited by attackers on the same network segment to crash the device or seize unauthorized control.
Three of the disclosed vulnerabilities stem from the device’s failure to enforce proper memory boundary checks when processing HTTP and video streaming inputs.
In each case, an adjacent attacker can send specially crafted payloads that force the system to write data outside its allocated memory space, triggering heap corruption and a Denial-of-Service (DoS) condition that crashes or freezes the camera’s core processes.
All three vulnerabilities carry a CVSS v4.0 severity score of 7.1.
Authentication Bypass (CVE-2026-34121)
The most critical flaw in this advisory is an authentication bypass in the camera’s DS configuration service.
The vulnerability arises from inconsistent authorization logic when the system parses JSON requests during authentication.
An unauthenticated attacker can attach a no-login-required action to a request embedding restricted configuration commands, effectively tricking the device into bypassing its own authorization checks entirely.
Successful exploitation grants the attacker the ability to execute privileged commands and modify device state without any valid credentials. This flaw holds the highest severity in the batch with a CVSS v4.0 score of 8.7.
Stack-Based Buffer Overflow (CVE-2026-34122)
A stack-based buffer overflow exists in the DS configuration service due to poor input validation.
Submitting an unusually long value for a specific configuration parameter triggers the overflow, causing service crashes or a forced device reboot, abruptly cutting off video surveillance. CVSS v4.0 score: 7.1.
Path Expansion Overflow (CVE-2026-34124)
The final vulnerability exploits a gap in HTTP request path parsing. While raw path lengths are capped, the device fails to account for additional length introduced during path normalization.
An adjacent attacker can send a manipulated HTTP request that expands beyond memory limits, causing buffer overflow, memory corruption, and a forced camera reboot. CVSS v4.0 score: 7.1.
These vulnerabilities specifically affect the TP-Link Tapo C520WS v2.6 running firmware versions older than 1.2.4 Build 260326 Rel.24666n.
TP-Link strongly urges all users to update their firmware immediately via the device’s management interface or the Tapo mobile application.
Patches are also available directly from TP-Link’s official support website. Keeping IoT devices updated remains the most effective defense against network intrusion and surveillance disruption.
Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google
The post Critical TP-Link Flaws Enable Attackers to Crash Routers and Cause DoS appeared first on Cyber Security News.
50 Years Ago The Northampton City Council last night took under advisement Charles J. Eberlein’s…
AMHERST — Reductions in federal funding for research and development could negatively impact the Massachusetts…
NORTHAMPTON — Passover in the Jewish community is a family affair — an annual spring…
Mark Roberts Motion Control (MRMC) appointed Nick Barthee as COO to lead global operations and…
NBC Sports is using the GoVertical! AiDi feature of viztrick AiDi to stream live sporting…
Globo, a Latin American media group, transitioned its primary content distribution to Synamedia Secure Reliable…
This website uses cookies.