CVE-2026-0653

On TP-Link Tapo C260 v1 and D235 v1, a guest‑level authenticated user can bypass intended access restrictions by sending crafted requests to a synchronization endpoint. This allows modification of protected device settings despite limited privileges. An attacker may change sensitive configuration parameters without authorization, resulting in unauthorized device state manipulation but not full code execution.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:tapo_c260_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tapo_c260:1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-10 18:16

Updated : 2026-03-13 19:53


NVD link : CVE-2026-0653

Mitre link : CVE-2026-0653

CVE.ORG link : CVE-2026-0653


JSON object : View

Products Affected

tp-link

  • tapo_c260_firmware
  • tapo_c260
CWE
CWE-284

Improper Access Control