On TP-Link Tapo C260 v1, a guest‑level authenticated user can bypass intended access restrictions by sending crafted requests to a synchronization endpoint. This allows modification of protected device settings despite limited privileges. An attacker may change sensitive configuration parameters without authorization, resulting in unauthorized device state manipulation but not full code execution.
References
| Link | Resource |
|---|---|
| https://www.tp-link.com/en/support/download/tapo-c260/v1/ | Product |
| https://www.tp-link.com/us/support/download/tapo-c260/v1/ | Product |
| https://www.tp-link.com/us/support/faq/4960/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
13 Feb 2026, 20:45
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Tp-link
Tp-link tapo C260 Tp-link tapo C260 Firmware |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| CPE | cpe:2.3:h:tp-link:tapo_c260:1:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tapo_c260_firmware:*:*:*:*:*:*:*:* |
|
| References | () https://www.tp-link.com/en/support/download/tapo-c260/v1/ - Product | |
| References | () https://www.tp-link.com/us/support/download/tapo-c260/v1/ - Product | |
| References | () https://www.tp-link.com/us/support/faq/4960/ - Vendor Advisory |
10 Feb 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-10 18:16
Updated : 2026-02-13 20:45
NVD link : CVE-2026-0653
Mitre link : CVE-2026-0653
CVE.ORG link : CVE-2026-0653
JSON object : View
Products Affected
tp-link
- tapo_c260
- tapo_c260_firmware
CWE
CWE-284
Improper Access Control
