Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0629: CWE-287 Improper Authentication in TP-Link Systems Inc. VIGI InSight Sx45 Series (S245/S345/S445)

0
High
VulnerabilityCVE-2026-0629cvecve-2026-0629cwe-287
Published: Fri Jan 16 2026 (01/16/2026, 17:24:39 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link Systems Inc.
Product: VIGI InSight Sx45 Series (S245/S345/S445)

Description

Authentication bypass in the password recovery feature of the local web interface across multiple VIGI camera models allows an attacker on the LAN to reset the admin password without verification by manipulating client-side state. Attackers can gain full administrative access to the device, compromising configuration and network security.

AI-Powered Analysis

AILast updated: 01/16/2026, 17:51:00 UTC

Technical Analysis

CVE-2026-0629 is an authentication bypass vulnerability categorized under CWE-287, affecting the TP-Link VIGI InSight Sx45 Series IP cameras (models S245, S345, S445). The vulnerability resides in the password recovery mechanism of the device's local web interface. Specifically, an attacker connected to the same local area network (LAN) can exploit a flaw in client-side state management to reset the administrator password without any authentication or verification steps. This bypass occurs because the password recovery feature does not properly validate the legitimacy of the password reset request, allowing manipulation of client-side data to trigger a reset. As a result, the attacker gains full administrative privileges on the device, enabling them to alter configurations, disable security features, or pivot within the network. The CVSS 4.0 score of 8.7 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no need for privileges or user interaction. The vulnerability affects all versions identified as '0' (likely initial or all firmware versions prior to patching). No patches or exploits are currently publicly available, but the flaw's nature suggests it could be weaponized in targeted attacks or lateral movement scenarios within compromised networks.

Potential Impact

For European organizations, this vulnerability presents a significant risk, especially for those using TP-Link VIGI InSight Sx45 Series cameras in enterprise, government, or critical infrastructure environments. An attacker exploiting this flaw can gain full administrative control over the affected devices, potentially leading to unauthorized surveillance, tampering with security settings, or using the compromised cameras as footholds for further network intrusion. The breach of confidentiality could expose sensitive video feeds, while integrity and availability impacts could disrupt security monitoring operations. Given the local network access requirement, organizations with poorly segmented or inadequately secured LANs are particularly vulnerable. The risk extends to sectors such as public administration, transportation, energy, and manufacturing, where these cameras may be deployed for physical security. Additionally, the lack of authentication in the password recovery process undermines trust in device security and could lead to compliance issues under European data protection regulations if personal data is exposed.

Mitigation Recommendations

1. Immediately segment the network to isolate VIGI InSight cameras from general user LANs, restricting access to trusted management subnets only. 2. Implement strict access control lists (ACLs) on network switches and routers to limit which devices can communicate with the cameras. 3. Disable or restrict the password recovery feature if possible until a vendor patch is available. 4. Monitor network traffic for unusual password reset attempts or unauthorized access to the camera web interfaces. 5. Enforce strong physical security controls to prevent unauthorized local network access. 6. Regularly audit device configurations and logs to detect signs of compromise. 7. Engage with TP-Link for firmware updates or patches addressing this vulnerability and apply them promptly once released. 8. Consider deploying network intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting these devices. 9. Educate IT and security teams about the vulnerability and the importance of local network security hygiene. 10. For critical deployments, evaluate alternative camera solutions with stronger security postures until this issue is resolved.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
TPLink
Date Reserved
2026-01-06T00:07:04.905Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696a7724b22c7ad868c4289e

Added to database: 1/16/2026, 5:36:36 PM

Last enriched: 1/16/2026, 5:51:00 PM

Last updated: 1/16/2026, 6:42:28 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats