Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0653: CWE-284 Improper Access Control in TP-Link Systems Inc. Tapo C260 v1

0
High
VulnerabilityCVE-2026-0653cvecve-2026-0653cwe-284
Published: Tue Feb 10 2026 (02/10/2026, 17:27:31 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link Systems Inc.
Product: Tapo C260 v1

Description

On TP-Link Tapo C260 v1, a guest‑level authenticated user can bypass intended access restrictions by sending crafted requests to a synchronization endpoint. This allows modification of protected device settings despite limited privileges. An attacker may change sensitive configuration parameters without authorization, resulting in unauthorized device state manipulation but not full code execution.

AI-Powered Analysis

AILast updated: 02/18/2026, 10:10:58 UTC

Technical Analysis

CVE-2026-0653 is an improper access control vulnerability (CWE-284) found in the TP-Link Tapo C260 v1 smart camera. The flaw allows an attacker with guest-level authentication to bypass intended access restrictions by sending specially crafted requests to a synchronization endpoint within the device's firmware. This endpoint fails to properly enforce privilege checks, enabling the attacker to modify protected device settings that should be inaccessible at their privilege level. The vulnerability does not allow full code execution or remote takeover but permits unauthorized changes to sensitive configuration parameters, potentially impacting device behavior and security posture. The CVSS v4.0 score is 7.2 (high), reflecting network attack vector, low attack complexity, no authentication required beyond guest-level access, and significant impact on confidentiality, integrity, and availability of device settings. No patches or exploits are currently publicly available, but the vulnerability is officially published and reserved as of early 2026.

Potential Impact

For European organizations deploying TP-Link Tapo C260 v1 cameras, this vulnerability could lead to unauthorized manipulation of device configurations, undermining the integrity and reliability of security monitoring systems. Attackers could disable or alter camera functions, potentially creating blind spots or enabling further attacks on network infrastructure. The compromise of device settings could also lead to privacy violations if cameras are used in sensitive environments. Given the widespread use of TP-Link devices in consumer and small business markets across Europe, the risk extends to sectors relying on these cameras for physical security and surveillance. The lack of full code execution limits the scope but does not eliminate the threat of operational disruption and data exposure.

Mitigation Recommendations

Organizations should immediately audit their deployments of TP-Link Tapo C260 v1 cameras and restrict guest-level access to trusted users only. Network segmentation should be enforced to isolate IoT devices from critical infrastructure and sensitive data environments. Monitoring and logging of device configuration changes should be enabled to detect unauthorized modifications. Where possible, disable or restrict access to synchronization endpoints or services that handle configuration changes. Since no official patches are currently available, consider temporary device replacement or firmware rollback if a secure version exists. Engage with TP-Link support channels for updates and apply patches promptly once released. Additionally, implement strong authentication mechanisms and consider network-level controls such as firewall rules to limit access to device management interfaces.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
TPLink
Date Reserved
2026-01-06T18:19:03.788Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698b6f014b57a58fa11d374b

Added to database: 2/10/2026, 5:46:41 PM

Last enriched: 2/18/2026, 10:10:58 AM

Last updated: 2/21/2026, 12:19:03 AM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats