CVE-2026-34121

🟡 Monitoruj

Obejście uwierzytelnienia w TP-Link Tapo C520WS umożliwia nieautoryzowaną zmianę stanu urządzenia.

CVSS
8.8
EPSS
0.1%
Exploit
none
Vendor
tp-link
Opis źródłowy (NVD)

An authentication bypass vulnerability within the HTTP handling of the DS configuration service in TP-Link Tapo C520WS v2.6 was identified, due to inconsistent parsing and authorization logic in JSON requests during authentication check. An unauthenticated attacker can append an authentication-exempt action to a request containing privileged DS do actions, bypassing authorization checks. Successful exploitation allows unauthenticated execution of restricted configuration actions, which may result in unauthorized modification of device state.

auth-bypass Brak patcha
Źródła i daty
ŹródłoWartość
NVD – CVSS8.8
CISA KEV (aktywnie wykorzystywane)Nie
FIRST EPSS (prawdopodobieństwo exploita)0.1%
Opublikowano (NVD)2026-04-02 18:16:28 UTC
Ostatnia modyfikacja (NVD)2026-04-06 20:24:48 UTC
Referencje