CVE-2026-0651

On TP-Link Tapo C260 v1 and D235 v1, path traversal is possible due to improper handling of specific GET request paths via https, allowing local unauthenticated probing of filesystem paths. An attacker on the local network can determine whether certain files exists on the device, with no read, write or code execution possibilities.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:tapo_c260_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tapo_c260:1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-10 18:16

Updated : 2026-03-13 19:53


NVD link : CVE-2026-0651

Mitre link : CVE-2026-0651

CVE.ORG link : CVE-2026-0651


JSON object : View

Products Affected

tp-link

  • tapo_c260_firmware
  • tapo_c260
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')