CVE-2026-0651
- EPSS 0.1%
- Veröffentlicht 10.02.2026 17:27:51
- Zuletzt bearbeitet 13.03.2026 19:53:56
On TP-Link Tapo C260 v1 and D235 v1, path traversal is possible due to improper handling of specific GET request paths via https, allowing local unauthenticated probing of filesystem paths. An attacker on the local network can determine whether certa...
CVE-2026-0652
- EPSS 0.15%
- Veröffentlicht 10.02.2026 17:27:42
- Zuletzt bearbeitet 13.02.2026 20:45:16
On TP-Link Tapo C260 v1, command injection vulnerability exists due to improper sanitization in certain POST parameters during configuration synchronization. An authenticated attacker can execute arbitrary system commands with high impact on confiden...
CVE-2026-0653
- EPSS 0.06%
- Veröffentlicht 10.02.2026 17:27:31
- Zuletzt bearbeitet 13.03.2026 19:53:56
On TP-Link Tapo C260 v1 and D235 v1, a guest‑level authenticated user can bypass intended access restrictions by sending crafted requests to a synchronization endpoint. This allows modification of protected device settings despite limited privileges....