CVE-2026-0653
Severity CVSS v4.0:
HIGH
Type:
CWE-284
Improper Access Control
Publication date:
10/02/2026
Last modified:
13/03/2026
Description
On TP-Link Tapo C260 v1 and D235 v1, a guest‑level authenticated user can bypass intended access restrictions by sending crafted requests to a synchronization endpoint. This allows modification of protected device settings despite limited privileges. An attacker may change sensitive configuration parameters without authorization, resulting in unauthorized device state manipulation but not full code execution.
Impact
Base Score 4.0
7.20
Severity 4.0
HIGH
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:tp-link:tapo_c260_firmware:*:*:*:*:*:*:*:* | 1.1.9 (excluding) | |
| cpe:2.3:h:tp-link:tapo_c260:1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



