On TP-Link Tapo C260 v1, a guest‑level authenticated user can bypass intended access restrictions by sending crafted requests to a synchronization endpoint. This allows modification of protected device settings despite limited privileges. An attacker may change sensitive configuration parameters without authorization, resulting in unauthorized device state manipulation but not full code execution.
History

Tue, 10 Feb 2026 17:45:00 +0000

Type Values Removed Values Added
Description On TP-Link Tapo C260 v1, a guest‑level authenticated user can bypass intended access restrictions by sending crafted requests to a synchronization endpoint. This allows modification of protected device settings despite limited privileges. An attacker may change sensitive configuration parameters without authorization, resulting in unauthorized device state manipulation but not full code execution.
Title Insecure Access Control on TP-Link Tapo D235 and C260
Weaknesses CWE-284
References
Metrics cvssV4_0

{'score': 7.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published:

Updated: 2026-02-10T17:27:31.365Z

Reserved: 2026-01-06T18:19:03.788Z

Link: CVE-2026-0653

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-10T18:16:22.257

Modified: 2026-02-10T18:16:22.257

Link: CVE-2026-0653

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.