CVE-2025-14300

Published: Dic 20, 2025 Last Modified: Gen 08, 2026
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 8,7
Source: f23511db-6c3e-4e32-a477-6aa17d310630
Attack Vector: adjacent
Attack Complexity: low
Privileges Required: none
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
HIGH 8,1
Attack Vector: adjacent_network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: high
Availability: high

Description

AI Translation Available

The HTTPS service on Tapo C200 V3 exposes a connectAP interface without proper authentication. An unauthenticated attacker on the same local network segment can exploit this to modify the device’s Wi-Fi configuration, resulting in loss of connectivity and denial-of-service (DoS).

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0008
Percentile
0,2th
Updated

EPSS Score Trend (Last 87 Days)

306

Missing Authentication for Critical Function

Draft
Common Consequences
Security Scopes Affected:
Access Control Other
Potential Impacts:
Gain Privileges Or Assume Identity Varies By Context
Applicable Platforms
Technologies: Cloud Computing, ICS/OT
View CWE Details
Operating System

Tapo C200 Firmware by Tp-Link

cpe:2.3:o:tp-link:tapo_c200_firmware:1.3.14:build_240513:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Tapo C200 Firmware by Tp-Link

cpe:2.3:o:tp-link:tapo_c200_firmware:1.3.4:build_230424:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Tapo C200 Firmware by Tp-Link

cpe:2.3:o:tp-link:tapo_c200_firmware:1.3.7:build_230920:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Tapo C200 Firmware by Tp-Link

cpe:2.3:o:tp-link:tapo_c200_firmware:1.4.2:build_250313:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Tapo C200 Firmware by Tp-Link

cpe:2.3:o:tp-link:tapo_c200_firmware:1.3.11:build_231115:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Tapo C200 Firmware by Tp-Link

cpe:2.3:o:tp-link:tapo_c200_firmware:1.3.5:build_230717:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Tapo C200 Firmware by Tp-Link

cpe:2.3:o:tp-link:tapo_c200_firmware:1.3.15:build_240715:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Tapo C200 Firmware by Tp-Link

cpe:2.3:o:tp-link:tapo_c200_firmware:1.4.1:build_241212:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Tapo C200 Firmware by Tp-Link

cpe:2.3:o:tp-link:tapo_c200_firmware:1.3.3:build_230228:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Tapo C200 Firmware by Tp-Link

cpe:2.3:o:tp-link:tapo_c200_firmware:1.3.13:build_240327:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Tapo C200 Firmware by Tp-Link

cpe:2.3:o:tp-link:tapo_c200_firmware:1.4.4:build_250922:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Tapo C200 Firmware by Tp-Link

cpe:2.3:o:tp-link:tapo_c200_firmware:1.3.9:build_231019:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://www.tp-link.com/us/support/download/tapo-c200/v3/#Firmware-Release-Notes
https://www.tp-link.com/us/support/faq/4849/