Description
An authenticated buffer handling flaw in TP-Link VIGI C385 V1 Web API lacking input sanitization, may allow memory corruption leading to remote code execution. Authenticated attackers may trigger buffer overflow and potentially execute arbitrary code with elevated privileges.
Published: 2026-01-29
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

An authenticated buffer handling flaw exists in the TP‑Link VIGI C485 V1 web API. The flaw stems from missing input sanitization, allowing memory corruption that can be exploited to execute arbitrary code with elevated privileges. This effect is limited to users who can authenticate to the device, but once authenticated, an attacker can gain complete control of the system.

Affected Systems

The affected product is TP‑Link Systems Inc.’s VIGI C485 V1 router, running firmware version 1.0. The vulnerability is specifically noted in the web API exposed by this firmware release.

Risk and Exploitability

The CVSS score of 8.5 indicates high severity, yet the EPSS score is reported as less than 1%, suggesting a low likelihood of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires valid administrative credentials and involves triggering a buffer overflow in the web API, which could allow the attacker to run arbitrary code and potentially escape the device’s sandbox.

Generated by OpenCVE AI on April 18, 2026 at 14:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update for TP‑Link VIGI C485 V1 from the vendor’s download page.
  • If no newer firmware is available, block or disable the vulnerable Web API endpoint or restrict its use to trusted administrators only.
  • Change and strengthen the device’s administrative credentials to prevent unauthorized authentication.
  • Constrain network access to the device by placing it behind a firewall and limiting exposure to the Internet.

Generated by OpenCVE AI on April 18, 2026 at 14:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 09 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link vigi C385 Firmware
CPEs cpe:2.3:h:tp-link:vigi_c385:1.0:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:vigi_c385_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tp-link vigi C385 Firmware
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Fri, 30 Jan 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link
Tp-link vigi C385
Vendors & Products Tp-link
Tp-link vigi C385

Thu, 29 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 29 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Description An authenticated buffer handling flaw in TP-Link VIGI C385 V1 Web API lacking input sanitization, may allow memory corruption leading to remote code execution. Authenticated attackers may trigger buffer overflow and potentially execute arbitrary code with elevated privileges.
Title Authenticated RCE Vulnerability Due to Buffer Overflow on TP-Link VIGI C385
Weaknesses CWE-121
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Tp-link Vigi C385 Vigi C385 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published:

Updated: 2026-02-26T15:04:44.260Z

Reserved: 2026-01-26T21:21:21.310Z

Link: CVE-2026-1457

cve-icon Vulnrichment

Updated: 2026-01-29T20:35:14.606Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-29T19:16:19.160

Modified: 2026-03-09T17:36:37.653

Link: CVE-2026-1457

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T14:45:03Z

Weaknesses