On TP-Link Tapo C260 v1, path traversal is possible due to improper handling of specific GET request paths via https, allowing local unauthenticated probing of filesystem paths. An attacker on the local network can determine whether certain files exists on the device, with no read, write or code execution possibilities.
Metrics
Affected Vendors & Products
References
History
Wed, 11 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link
Tp-link tapo C260 V1 |
|
| Vendors & Products |
Tp-link
Tp-link tapo C260 V1 |
Wed, 11 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Feb 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | On TP-Link Tapo C260 v1, path traversal is possible due to improper handling of specific GET request paths via https, allowing local unauthenticated probing of filesystem paths. An attacker on the local network can determine whether certain files exists on the device, with no read, write or code execution possibilities. | |
| Title | Path Traversal on TP-Link Tapo D235 and C260 via Local https | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2026-02-11T15:11:26.884Z
Reserved: 2026-01-06T18:19:00.313Z
Link: CVE-2026-0651
Updated: 2026-02-11T15:11:22.192Z
Status : Awaiting Analysis
Published: 2026-02-10T18:16:21.977
Modified: 2026-02-10T21:51:48.077
Link: CVE-2026-0651
No data.