Impact
A guest‑level authenticated user on TP‑Link Tapo C260 v1 and D235 v1 can send crafted requests to a synchronization endpoint and modify protected device settings. The flaw allows unauthorized configuration changes but does not result in full code execution.
Affected Systems
TP‑Link Systems Inc. – Tapo C260 v1 and Tapo D235 v1 are susceptible to this access control weakness.
Risk and Exploitability
The vulnerability has a CVSS score of 7.2 and an EPSS of less than 1 %. It is not listed in the CISA KEV catalog. Because the attack requires a valid guest credential and network access to the device’s synchronization endpoint, exploitation is possible over the network but is considered low probability. The impact is the ability to alter device state without authorization, which undermines device integrity but does not expose other higher‑level privileges.
OpenCVE Enrichment