CVE-2026-0653
MEDIUMTp-link Tapo C260 Firmware < 1.1.9 - Improper Access Control
Title source: ruleDescription
On TP-Link Tapo C260 v1, a guest‑level authenticated user can bypass intended access restrictions by sending crafted requests to a synchronization endpoint. This allows modification of protected device settings despite limited privileges. An attacker may change sensitive configuration parameters without authorization, resulting in unauthorized device state manipulation but not full code execution.
Scores
CVSS v3
6.5
EPSS
0.0005
EPSS Percentile
13.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Classification
CWE
CWE-284
Status
published
Affected Products (1)
tp-link/tapo_c260_firmware
< 1.1.9
Timeline
Published
Feb 10, 2026
Tracked Since
Feb 18, 2026