Description
On TP-Link Tapo C260 v1, a guest‑level authenticated user can bypass intended access restrictions by sending crafted requests to a synchronization endpoint. This allows modification of protected device settings despite limited privileges. An attacker may change sensitive configuration parameters without authorization, resulting in unauthorized device state manipulation but not full code execution.
Problem types
CWE-284 Improper Access Control
Product status
Any version before 1.1.9 Build 251226 Rel.55870n
Credits
spaceraccoon
References
www.tp-link.com/us/support/download/tapo-c260/v1/
www.tp-link.com/en/support/download/tapo-c260/v1/
www.tp-link.com/us/support/faq/4960/