Unrated severityNVD Advisory· Published Jan 29, 2026· Updated Feb 26, 2026
Authenticated RCE Vulnerability Due to Buffer Overflow on TP-Link VIGI C385
CVE-2026-1457
Description
An authenticated buffer handling flaw in TP-Link VIGI C385 V1 Web API lacking input sanitization, may allow memory corruption leading to remote code execution. Authenticated attackers may trigger buffer overflow and potentially execute arbitrary code with elevated privileges.
Affected products
2- TP-Link Systems Inc./VIGI C485 V1v5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- www.tp-link.com/en/support/download/vigi-c385/v1/mitrepatch
- www.tp-link.com/kr/support/download/vigi-c385/v1/mitrepatch
- www.tp-link.com/us/support/faq/4931/mitrevendor-advisory
News mentions
0No linked articles in our index yet.