On TP-Link Tapo C260 v1, path traversal is possible due to improper handling of specific GET request paths via https, allowing local unauthenticated probing of filesystem paths. An attacker on the local network can determine whether certain files exists on the device, with no read, write or code execution possibilities.
Metrics
Affected Vendors & Products
References
History
Tue, 10 Feb 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | On TP-Link Tapo C260 v1, path traversal is possible due to improper handling of specific GET request paths via https, allowing local unauthenticated probing of filesystem paths. An attacker on the local network can determine whether certain files exists on the device, with no read, write or code execution possibilities. | |
| Title | Path Traversal on TP-Link Tapo D235 and C260 via Local https | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2026-02-10T17:27:51.942Z
Reserved: 2026-01-06T18:19:00.313Z
Link: CVE-2026-0651
No data.
Status : Received
Published: 2026-02-10T18:16:21.977
Modified: 2026-02-10T18:16:21.977
Link: CVE-2026-0651
No data.
OpenCVE Enrichment
No data.