CVE-2026-0651

HIGH

Tp-link Tapo C260 Firmware < 1.1.9 - Path Traversal

Title source: rule

Description

On TP-Link Tapo C260 v1, path traversal is possible due to improper handling of specific GET request paths via https, allowing local unauthenticated probing of filesystem paths. An attacker on the local network can determine whether certain files exists on the device, with no read, write or code execution possibilities.

Exploits (2)

github WORKING POC 10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2026/CVE-2026-0651
nomisec WORKING POC
by l0lsec · poc
https://github.com/l0lsec/tapo-c260-rce

Scores

CVSS v3 7.8
EPSS 0.0008
EPSS Percentile 24.3%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-22
Status published

Affected Products (1)

tp-link/tapo_c260_firmware < 1.1.9

Timeline

Published Feb 10, 2026
Tracked Since Feb 18, 2026