An authenticated buffer handling flaw in TP-Link VIGI C385 V1 Web API lacking input sanitization, may allow memory corruption leading to remote code execution. Authenticated attackers may trigger buffer overflow and potentially execute arbitrary code with elevated privileges.
Metrics
Affected Vendors & Products
References
History
Thu, 29 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 29 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An authenticated buffer handling flaw in TP-Link VIGI C385 V1 Web API lacking input sanitization, may allow memory corruption leading to remote code execution. Authenticated attackers may trigger buffer overflow and potentially execute arbitrary code with elevated privileges. | |
| Title | Authenticated RCE Vulnerability Due to Buffer Overflow on TP-Link VIGI C385 | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2026-01-29T20:35:23.572Z
Reserved: 2026-01-26T21:21:21.310Z
Link: CVE-2026-1457
Updated: 2026-01-29T20:35:14.606Z
Status : Received
Published: 2026-01-29T19:16:19.160
Modified: 2026-01-29T19:16:19.160
Link: CVE-2026-1457
No data.
OpenCVE Enrichment
No data.