PT-2026-5328 · Tp Link · Vigi C385 V1
Published
2026-01-29
·
Updated
2026-03-09
·
CVE-2026-1457
CVSS v3.1
8.8
| Vector | AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
TP-Link VIGI C385 V1
Description
An authenticated buffer handling flaw exists in the TP-Link VIGI C385 V1 Web API. The flaw is due to a lack of input sanitization, which may allow memory corruption and potentially lead to remote code execution. Authenticated attackers may be able to trigger a buffer overflow and execute arbitrary code with elevated privileges. The vulnerable component is the Web API.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Exploit
RCE
Stack Overflow
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Vigi C385 V1