On TP-Link Tapo C260 v1 and D235 v1, a guest‑level authenticated user can bypass intended access restrictions by sending crafted requests to a synchronization endpoint. This allows modification of protected device settings despite limited privileges. An attacker may change sensitive configuration parameters without authorization, resulting in unauthorized device state manipulation but not full code execution.
References
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-02-10 18:16
Updated : 2026-03-13 19:53
NVD link : CVE-2026-0653
Mitre link : CVE-2026-0653
CVE.ORG link : CVE-2026-0653
JSON object : View
Products Affected
tp-link
- tapo_c260_firmware
- tapo_c260
CWE
CWE-284
Improper Access Control
