CVE-2026-0653

On TP-Link Tapo C260 v1, a guest‑level authenticated user can bypass intended access restrictions by sending crafted requests to a synchronization endpoint. This allows modification of protected device settings despite limited privileges. An attacker may change sensitive configuration parameters without authorization, resulting in unauthorized device state manipulation but not full code execution.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:tapo_c260_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tapo_c260:1:*:*:*:*:*:*:*

History

13 Feb 2026, 20:45

Type Values Removed Values Added
First Time Tp-link
Tp-link tapo C260
Tp-link tapo C260 Firmware
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
CPE cpe:2.3:h:tp-link:tapo_c260:1:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:tapo_c260_firmware:*:*:*:*:*:*:*:*
References () https://www.tp-link.com/en/support/download/tapo-c260/v1/ - () https://www.tp-link.com/en/support/download/tapo-c260/v1/ - Product
References () https://www.tp-link.com/us/support/download/tapo-c260/v1/ - () https://www.tp-link.com/us/support/download/tapo-c260/v1/ - Product
References () https://www.tp-link.com/us/support/faq/4960/ - () https://www.tp-link.com/us/support/faq/4960/ - Vendor Advisory

10 Feb 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-10 18:16

Updated : 2026-02-13 20:45


NVD link : CVE-2026-0653

Mitre link : CVE-2026-0653

CVE.ORG link : CVE-2026-0653


JSON object : View

Products Affected

tp-link

  • tapo_c260
  • tapo_c260_firmware
CWE
CWE-284

Improper Access Control