Vulnerability Details CVE-2025-14300
The HTTPS service on Tapo C200 V3 exposes a connectAP interface without proper authentication. An unauthenticated attacker on the same local network segment can exploit this to modify the device’s Wi-Fi configuration, resulting in loss of connectivity and denial-of-service (DoS).
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 15.2%
CVSS Severity
CVSS v3 Score 8.1
Products affected by CVE-2025-14300
-
cpe:2.3:h:tp-link:tapo_c200:3
-
cpe:2.3:o:tp-link:tapo_c200_firmware:1.3.11
-
cpe:2.3:o:tp-link:tapo_c200_firmware:1.3.13
-
cpe:2.3:o:tp-link:tapo_c200_firmware:1.3.14
-
cpe:2.3:o:tp-link:tapo_c200_firmware:1.3.15
-
cpe:2.3:o:tp-link:tapo_c200_firmware:1.3.3
-
cpe:2.3:o:tp-link:tapo_c200_firmware:1.3.4
-
cpe:2.3:o:tp-link:tapo_c200_firmware:1.3.5
-
cpe:2.3:o:tp-link:tapo_c200_firmware:1.3.7
-
cpe:2.3:o:tp-link:tapo_c200_firmware:1.3.9
-
cpe:2.3:o:tp-link:tapo_c200_firmware:1.4.1
-
cpe:2.3:o:tp-link:tapo_c200_firmware:1.4.2
-
cpe:2.3:o:tp-link:tapo_c200_firmware:1.4.4