On TP-Link Tapo C260 v1, path traversal is possible due to improper handling of specific GET request paths via https, allowing local unauthenticated probing of filesystem paths. An attacker on the local network can determine whether certain files exists on the device, with no read, write or code execution possibilities.
References
| Link | Resource |
|---|---|
| https://www.tp-link.com/en/support/download/tapo-c260/v1/ | Product |
| https://www.tp-link.com/us/support/download/tapo-c260/v1/ | Product |
| https://www.tp-link.com/us/support/faq/4960/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
13 Feb 2026, 20:45
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CPE | cpe:2.3:h:tp-link:tapo_c260:1:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tapo_c260_firmware:*:*:*:*:*:*:*:* |
|
| First Time |
Tp-link
Tp-link tapo C260 Tp-link tapo C260 Firmware |
|
| References | () https://www.tp-link.com/en/support/download/tapo-c260/v1/ - Product | |
| References | () https://www.tp-link.com/us/support/download/tapo-c260/v1/ - Product | |
| References | () https://www.tp-link.com/us/support/faq/4960/ - Vendor Advisory |
10 Feb 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-10 18:16
Updated : 2026-02-13 20:45
NVD link : CVE-2026-0651
Mitre link : CVE-2026-0651
CVE.ORG link : CVE-2026-0651
JSON object : View
Products Affected
tp-link
- tapo_c260
- tapo_c260_firmware
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
