On TP-Link Tapo C260 v1, a guest‑level authenticated user can bypass intended access restrictions by sending crafted requests to a synchronization endpoint. This allows modification of protected device settings despite limited privileges. An attacker may change sensitive configuration parameters without authorization, resulting in unauthorized device state manipulation but not full code execution.
Metrics
Affected Vendors & Products
References
History
Wed, 11 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link
Tp-link tapo C260 V1 |
|
| Vendors & Products |
Tp-link
Tp-link tapo C260 V1 |
Wed, 11 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Feb 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | On TP-Link Tapo C260 v1, a guest‑level authenticated user can bypass intended access restrictions by sending crafted requests to a synchronization endpoint. This allows modification of protected device settings despite limited privileges. An attacker may change sensitive configuration parameters without authorization, resulting in unauthorized device state manipulation but not full code execution. | |
| Title | Insecure Access Control on TP-Link Tapo D235 and C260 | |
| Weaknesses | CWE-284 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2026-02-11T15:08:22.279Z
Reserved: 2026-01-06T18:19:03.788Z
Link: CVE-2026-0653
Updated: 2026-02-11T15:08:15.918Z
Status : Awaiting Analysis
Published: 2026-02-10T18:16:22.257
Modified: 2026-02-10T21:51:48.077
Link: CVE-2026-0653
No data.