🔐 CVE Alert

CVE-2026-1457

UNKNOWN 0.0

Authenticated RCE Vulnerability Due to Buffer Overflow on TP-Link VIGI C385

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

An authenticated buffer handling flaw in TP-Link VIGI C385 V1 Web API lacking input sanitization, may allow memory corruption leading to remote code execution. Authenticated attackers may trigger buffer overflow and potentially execute arbitrary code with elevated privileges.

CWE CWE-121
Vendor tp-link systems inc.
Product vigi c485 v1
Published Jan 29, 2026
Last Updated Feb 26, 2026
Stay Ahead of the Next One

Get instant alerts for tp-link systems inc. vigi c485 v1

Be the first to know when new unknown vulnerabilities affecting tp-link systems inc. vigi c485 v1 are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

TP-Link Systems Inc. / VIGI C485 V1
0 < 3.1.1 Build 251124 Rel.50371n

References

NVD ↗ CVE.org ↗ EPSS Data ↗
tp-link.com: https://www.tp-link.com/en/support/download/vigi-c385/v1/#Firmware tp-link.com: https://www.tp-link.com/kr/support/download/vigi-c385/v1/#Firmware tp-link.com: https://www.tp-link.com/us/support/faq/4931/

Credits

SeonGoo Lee (classun9), MinSeong Kim (ii4gsp) of NSHC RedAlert Labs