PT-2026-5328 · Tp Link · Vigi C385 V1

Published

2026-01-29

·

Updated

2026-01-29

·

CVE-2026-1457

CVSS v4.0
8.5
VectorAV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Name of the Vulnerable Software and Affected Versions TP-Link VIGI C385 V1
Description An authenticated buffer handling flaw exists in the TP-Link VIGI C385 V1 Web API. The flaw is due to a lack of input sanitization, which may allow memory corruption and potentially lead to remote code execution. Authenticated attackers may be able to trigger a buffer overflow and execute arbitrary code with elevated privileges. The vulnerable component is the Web API.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

RCE

Stack Overflow

Weakness Enumeration

Related Identifiers

CVE-2026-1457

Affected Products

Vigi C385 V1