On TP-Link Tapo C260 v1, path traversal is possible due to improper handling of specific GET request paths via https, allowing local unauthenticated probing of filesystem paths. An attacker on the local network can determine whether certain files exists on the device, with no read, write or code execution possibilities.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 10 Feb 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | On TP-Link Tapo C260 v1, path traversal is possible due to improper handling of specific GET request paths via https, allowing local unauthenticated probing of filesystem paths. An attacker on the local network can determine whether certain files exists on the device, with no read, write or code execution possibilities. | |
| Title | Path Traversal on TP-Link Tapo D235 and C260 via Local https | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2026-02-10T17:27:51.942Z
Reserved: 2026-01-06T18:19:00.313Z
Link: CVE-2026-0651
No data.
Status : Awaiting Analysis
Published: 2026-02-10T18:16:21.977
Modified: 2026-02-10T21:51:48.077
Link: CVE-2026-0651
No data.
OpenCVE Enrichment
No data.
Weaknesses