ID

VAR-202512-2773


CVE

CVE-2025-14299


TITLE

TP-LINK Technologies of tapo c200  Multiple vulnerabilities in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-024336

DESCRIPTION

The HTTPS server on Tapo C200 V3 does not properly validate the Content-Length header, which can lead to an integer overflow. An unauthenticated attacker on the same local network segment can send crafted HTTPS requests to trigger excessive memory allocation, causing the device to crash and resulting in denial-of-service (DoS). Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software

Trust: 1.62

sources: NVD: CVE-2025-14299 // JVNDB: JVNDB-2025-024336

AFFECTED PRODUCTS

vendor:tp linkmodel:tapo c200scope:eqversion:1.3.4

Trust: 1.0

vendor:tp linkmodel:tapo c200scope:eqversion:1.3.13

Trust: 1.0

vendor:tp linkmodel:tapo c200scope:eqversion:1.3.5

Trust: 1.0

vendor:tp linkmodel:tapo c200scope:eqversion:1.3.3

Trust: 1.0

vendor:tp linkmodel:tapo c200scope:eqversion:1.3.15

Trust: 1.0

vendor:tp linkmodel:tapo c200scope:eqversion:1.4.4

Trust: 1.0

vendor:tp linkmodel:tapo c200scope:eqversion:1.3.9

Trust: 1.0

vendor:tp linkmodel:tapo c200scope:eqversion:1.3.7

Trust: 1.0

vendor:tp linkmodel:tapo c200scope:eqversion:1.3.11

Trust: 1.0

vendor:tp linkmodel:tapo c200scope:eqversion:1.3.14

Trust: 1.0

vendor:tp linkmodel:tapo c200scope:eqversion:1.4.1

Trust: 1.0

vendor:tp linkmodel:tapo c200scope:eqversion:1.4.2

Trust: 1.0

vendor:tp linkmodel:tapo c200scope:eqversion:tapo c200 firmware 1.3.14

Trust: 0.8

vendor:tp linkmodel:tapo c200scope:eqversion:tapo c200 firmware 1.4.1

Trust: 0.8

vendor:tp linkmodel:tapo c200scope:eqversion:tapo c200 firmware 1.3.7

Trust: 0.8

vendor:tp linkmodel:tapo c200scope:eqversion:tapo c200 firmware 1.4.4

Trust: 0.8

vendor:tp linkmodel:tapo c200scope: - version: -

Trust: 0.8

vendor:tp linkmodel:tapo c200scope:eqversion:tapo c200 firmware 1.3.3

Trust: 0.8

vendor:tp linkmodel:tapo c200scope:eqversion:tapo c200 firmware 1.3.5

Trust: 0.8

vendor:tp linkmodel:tapo c200scope:eqversion: -

Trust: 0.8

vendor:tp linkmodel:tapo c200scope:eqversion:tapo c200 firmware 1.3.4

Trust: 0.8

vendor:tp linkmodel:tapo c200scope:eqversion:tapo c200 firmware 1.3.11

Trust: 0.8

vendor:tp linkmodel:tapo c200scope:eqversion:tapo c200 firmware 1.3.15

Trust: 0.8

vendor:tp linkmodel:tapo c200scope:eqversion:tapo c200 firmware 1.3.9

Trust: 0.8

vendor:tp linkmodel:tapo c200scope:eqversion:tapo c200 firmware 1.3.13

Trust: 0.8

vendor:tp linkmodel:tapo c200scope:eqversion:tapo c200 firmware 1.4.2

Trust: 0.8

sources: JVNDB: JVNDB-2025-024336 // NVD: CVE-2025-14299

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2025-14299
value: MEDIUM

Trust: 1.0

f23511db-6c3e-4e32-a477-6aa17d310630: CVE-2025-14299
value: HIGH

Trust: 1.0

NVD: CVE-2025-14299
value: MEDIUM

Trust: 0.8

nvd@nist.gov: CVE-2025-14299
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2025-14299
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2025-024336 // NVD: CVE-2025-14299 // NVD: CVE-2025-14299

PROBLEMTYPE DATA

problemtype:CWE-770

Trust: 1.0

problemtype:CWE-190

Trust: 1.0

problemtype:Integer overflow or wraparound (CWE-190) [NVD evaluation ]

Trust: 0.8

problemtype: Allocation of resources without limits or throttling (CWE-770) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-024336 // NVD: CVE-2025-14299

PATCH

title:Security Advisory on Vulnerabilities in Tapo C200 (CVE-2025-8065, CVE-2025-14299 & CVE-2025-14300) | TP-Linkurl:https://www.tp-link.com/us/support/faq/4849/

Trust: 0.8

sources: JVNDB: JVNDB-2025-024336

EXTERNAL IDS

db:NVDid:CVE-2025-14299

Trust: 2.6

db:JVNDBid:JVNDB-2025-024336

Trust: 0.8

sources: JVNDB: JVNDB-2025-024336 // NVD: CVE-2025-14299

REFERENCES

url:https://www.tp-link.com/us/support/download/tapo-c200/v3/#firmware-release-notes

Trust: 1.8

url:https://www.tp-link.com/us/support/faq/4849/

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2025-14299

Trust: 0.8

sources: JVNDB: JVNDB-2025-024336 // NVD: CVE-2025-14299

SOURCES

db:JVNDBid:JVNDB-2025-024336
db:NVDid:CVE-2025-14299

LAST UPDATE DATE

2026-01-14T23:54:06.435000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2025-024336date:2026-01-13T05:54:00
db:NVDid:CVE-2025-14299date:2026-01-08T19:38:06.973

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2025-024336date:2026-01-13T00:00:00
db:NVDid:CVE-2025-14299date:2025-12-20T01:16:02.670