An authentication bypass vulnerability within the HTTP handling of the DS configuration service in TP-Link Tapo C520WS v2.6 was identified, due to inconsistent parsing and authorization logic in JSON requests during authentication check. An unauthenticated attacker can append an authentication-exempt action to a request containing privileged DS do actions, bypassing authorization checks.
Successful exploitation allows unauthenticated execution of restricted configuration actions, which may result in unauthorized modification of device state.
Metrics
Affected Vendors & Products
References
History
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link tapo C520ws
Tp-link tapo C520ws Firmware |
|
| CPEs | cpe:2.3:h:tp-link:tapo_c520ws:2.6:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tapo_c520ws_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tp-link tapo C520ws
Tp-link tapo C520ws Firmware |
|
| Metrics |
cvssV3_1
|
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link
Tp-link tapo C520ws V2 |
|
| Vendors & Products |
Tp-link
Tp-link tapo C520ws V2 |
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An authentication bypass vulnerability within the HTTP handling of the DS configuration service in TP-Link Tapo C520WS v2.6 was identified, due to inconsistent parsing and authorization logic in JSON requests during authentication check. An unauthenticated attacker can append an authentication-exempt action to a request containing privileged DS do actions, bypassing authorization checks. Successful exploitation allows unauthenticated execution of restricted configuration actions, which may result in unauthorized modification of device state. | |
| Title | Authentication Bypass in DS Configuration Service via HTTP Request Parsing Differential of TP-Link Tapo C520WS | |
| Weaknesses | CWE-287 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: TPLink
Published: 2026-04-02T17:20:06.705Z
Updated: 2026-04-02T17:58:52.376Z
Reserved: 2026-03-25T18:54:03.343Z
Link: CVE-2026-34121
Updated: 2026-04-02T17:58:47.830Z
Status : Analyzed
Published: 2026-04-02T18:16:28.990
Modified: 2026-04-06T20:24:48.170
Link: CVE-2026-34121
No data.