On TP-Link Tapo C260 v1, command injection vulnerability exists due to improper sanitization in certain POST parameters during configuration synchronization. An authenticated attacker can execute arbitrary system commands with high impact on confidentiality, integrity and availability. It may cause full device compromise.
References
| Link | Resource |
|---|---|
| https://www.tp-link.com/en/support/download/tapo-c260/v1/ | Product |
| https://www.tp-link.com/us/support/download/tapo-c260/v1/ | Product |
| https://www.tp-link.com/us/support/faq/4960/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-02-10 18:16
Updated : 2026-02-13 20:45
NVD link : CVE-2026-0652
Mitre link : CVE-2026-0652
CVE.ORG link : CVE-2026-0652
JSON object : View
Products Affected
tp-link
- tapo_c260_firmware
- tapo_c260
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
