CVE-2026-1457

An authenticated buffer handling flaw in TP-Link VIGI C385 V1 Web API lacking input sanitization, may allow memory corruption leading to remote code execution. Authenticated attackers may trigger buffer overflow and potentially execute arbitrary code with elevated privileges.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:vigi_c385_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:vigi_c385:1.0:*:*:*:*:*:*:*

History

09 Mar 2026, 17:36

Type Values Removed Values Added
CPE cpe:2.3:o:tp-link:vigi_c385_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:vigi_c385:1.0:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
First Time Tp-link
Tp-link vigi C385
Tp-link vigi C385 Firmware
Summary
  • (es) Una falla autenticada en el manejo de búfer en la API web de TP-Link VIGI C385 V1 que carece de saneamiento de entrada, puede permitir la corrupción de memoria lo que lleva a la ejecución remota de código. Atacantes autenticados pueden desencadenar un desbordamiento de búfer y potencialmente ejecutar código arbitrario con privilegios elevados.
References () https://www.tp-link.com/en/support/download/vigi-c385/v1/#Firmware - () https://www.tp-link.com/en/support/download/vigi-c385/v1/#Firmware - Product
References () https://www.tp-link.com/kr/support/download/vigi-c385/v1/#Firmware - () https://www.tp-link.com/kr/support/download/vigi-c385/v1/#Firmware - Product
References () https://www.tp-link.com/us/support/faq/4931/ - () https://www.tp-link.com/us/support/faq/4931/ - Vendor Advisory

29 Jan 2026, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-29 19:16

Updated : 2026-03-09 17:36


NVD link : CVE-2026-1457

Mitre link : CVE-2026-1457

CVE.ORG link : CVE-2026-1457


JSON object : View

Products Affected

tp-link

  • vigi_c385_firmware
  • vigi_c385
CWE
CWE-121

Stack-based Buffer Overflow