Description

On TP-Link Tapo C260 v1, path traversal is possible due to improper handling of specific GET request paths via https, allowing local unauthenticated probing of filesystem paths. An attacker on the local network can determine whether certain files exists on the device, with no read, write or code execution possibilities.

INFO

Published Date :

2026-02-10T17:27:51.942Z

Last Modified :

2026-02-11T15:11:26.884Z

Source :

TPLink
AFFECTED PRODUCTS

The following products are affected by CVE-2026-0651 vulnerability.

Vendors Products
Tp-link
  • Tapo C260
  • Tapo C260 Firmware
  • Tapo C260 V1
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-0651.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact