← Zuruck zu CVEs
CVE-2026-0653
MEDIUM6.5
Beschreibung
On TP-Link Tapo C260 v1 and D235 v1, a guest‑level authenticated user can bypass intended access restrictions by sending crafted requests to a synchronization endpoint. This allows modification of protected device settings despite limited privileges. An attacker may change sensitive configuration parameters without authorization, resulting in unauthorized device state manipulation but not full code execution.
CVE Details
CVSS v3.1 Bewertung6.5
SchweregradMEDIUM
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht2/10/2026
Zuletzt geandert3/13/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
tp-link:tapo_c260tp-link:tapo_c260_firmware
Schwachen (CWE)
CWE-284
Referenzen
https://www.tp-link.com/en/support/download/tapo-c260/v1/(f23511db-6c3e-4e32-a477-6aa17d310630)
https://www.tp-link.com/en/support/download/tapo-d235/(f23511db-6c3e-4e32-a477-6aa17d310630)
https://www.tp-link.com/us/support/download/tapo-c260/v1/(f23511db-6c3e-4e32-a477-6aa17d310630)
https://www.tp-link.com/us/support/faq/4960/(f23511db-6c3e-4e32-a477-6aa17d310630)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.