Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 11 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Feb 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | On TP-Link Tapo C260 v1, path traversal is possible due to improper handling of specific GET request paths via https, allowing local unauthenticated probing of filesystem paths. An attacker on the local network can determine whether certain files exists on the device, with no read, write or code execution possibilities. | |
| Title | Path Traversal on TP-Link Tapo D235 and C260 via Local https | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2026-02-11T15:11:26.884Z
Reserved: 2026-01-06T18:19:00.313Z
Link: CVE-2026-0651
Updated: 2026-02-11T15:11:22.192Z
Status : Awaiting Analysis
Published: 2026-02-10T18:16:21.977
Modified: 2026-02-10T21:51:48.077
Link: CVE-2026-0651
No data.
OpenCVE Enrichment
No data.