On TP-Link Tapo C260 v1 and D235 v1, path traversal is possible due to improper handling of specific GET request paths via https, allowing local unauthenticated probing of filesystem paths. An attacker on the local network can determine whether certain files exists on the device, with no read, write or code execution possibilities.
References
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-02-10 18:16
Updated : 2026-03-13 19:53
NVD link : CVE-2026-0651
Mitre link : CVE-2026-0651
CVE.ORG link : CVE-2026-0651
JSON object : View
Products Affected
tp-link
- tapo_c260_firmware
- tapo_c260
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
