CVE-2026-0653
On TP-Link Tapo C260 v1 and D235 v1, a guest‑level authenticated user can bypass intended access restrictions by sending crafted requests to a synchronization endpoint. This allows modification of protected device settings despite limited privileges. An attacker may change sensitive configuration parameters without authorization, resulting in unauthorized device state manipulation but not full code execution.
Vendor
Product
CWE
Yayın Tarihi
2026-02-10 18:16:22
Güncelleme
2026-03-13 19:53:56
Source Identifier
f23511db-6c3e-4e32-a477-6aa17d310630
KEV Date Added
-