An authenticated buffer handling flaw in TP-Link VIGI C385 V1 Web API lacking input sanitization, may allow memory corruption leading to remote code execution. Authenticated attackers may trigger buffer overflow and potentially execute arbitrary code with elevated privileges.
References
| Link | Resource |
|---|---|
| https://www.tp-link.com/en/support/download/vigi-c385/v1/#Firmware | Product |
| https://www.tp-link.com/kr/support/download/vigi-c385/v1/#Firmware | Product |
| https://www.tp-link.com/us/support/faq/4931/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
09 Mar 2026, 17:36
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:tp-link:vigi_c385_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:tp-link:vigi_c385:1.0:*:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| First Time |
Tp-link
Tp-link vigi C385 Tp-link vigi C385 Firmware |
|
| Summary |
|
|
| References | () https://www.tp-link.com/en/support/download/vigi-c385/v1/#Firmware - Product | |
| References | () https://www.tp-link.com/kr/support/download/vigi-c385/v1/#Firmware - Product | |
| References | () https://www.tp-link.com/us/support/faq/4931/ - Vendor Advisory |
29 Jan 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-29 19:16
Updated : 2026-03-09 17:36
NVD link : CVE-2026-1457
Mitre link : CVE-2026-1457
CVE.ORG link : CVE-2026-1457
JSON object : View
Products Affected
tp-link
- vigi_c385_firmware
- vigi_c385
CWE
CWE-121
Stack-based Buffer Overflow
