PT-2026-3270 · Unknown · Vigi Camera
Arko Dhar
+1
·
Published
2026-01-16
·
Updated
2026-02-27
·
CVE-2026-0629
CVSS v4.0
8.7
8.7
High
| Base vector | Vector | AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
Name of the Vulnerable Software and Affected Versions
TP-Link VIGI Cameras (affected versions not specified)
Description
An authentication bypass issue exists in the password recovery feature of the local web interface of TP-Link VIGI cameras. This allows an attacker on the Local Area Network (LAN) to reset the administrator password without verification by manipulating client-side state. Successful exploitation grants the attacker full administrative access to the device, potentially compromising configuration and network security. Over 2,500 internet-exposed cameras have been identified, increasing the risk of real-world takeover for poorly segmented or publicly reachable deployments. Attackers could gain access to live and recorded video feeds, disable security features, alter configurations, and potentially use the compromised devices for lateral movement within a network. The vulnerability affects over 32 VIGI C and InSight camera models.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Improper Authentication
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
CVE-2026-0629
Affected Products
Vigi Camera
References · 25
- https://tp-link.com/us/support/faq/4906 · Vendor Advisory
- https://vigi.com/us/support/download · Patch
- https://nvd.nist.gov/vuln/detail/CVE-2026-0629 · Security Note
- https://vigi.com/in/support/download · Patch
- https://tp-link.com/us/support/faq/4899 · Vendor Advisory
- https://vigi.com/en/support/download · Patch
- https://reddit.com/r/cybermaterial/comments/1qkpa8p/critical_tp_link_vigi_camera_takeover · Reddit Post
- https://twitter.com/ThreatSynop/status/2013544693045309831 · Twitter Post
- https://twitter.com/catnap707/status/2013359826458304907 · Twitter Post
- https://t.me/pentestingnews/72484 · Telegram Post
- https://reddit.com/r/pwnhub/comments/1qhagx8/tplink_addresses_critical_vulnerability_in_vigi · Reddit Post
- https://twitter.com/TweetThreatNews/status/2013378484224078113 · Twitter Post
- https://t.me/NeKaspersky/4864 · Telegram Post
- https://twitter.com/ThreatSynop/status/2014021246657196525 · Twitter Post
- https://twitter.com/zoomeye_team/status/2013901907350483305 · Twitter Post