Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 29 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 29 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An authenticated buffer handling flaw in TP-Link VIGI C385 V1 Web API lacking input sanitization, may allow memory corruption leading to remote code execution. Authenticated attackers may trigger buffer overflow and potentially execute arbitrary code with elevated privileges. | |
| Title | Authenticated RCE Vulnerability Due to Buffer Overflow on TP-Link VIGI C385 | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2026-01-29T20:35:23.572Z
Reserved: 2026-01-26T21:21:21.310Z
Link: CVE-2026-1457
Updated: 2026-01-29T20:35:14.606Z
Status : Received
Published: 2026-01-29T19:16:19.160
Modified: 2026-01-29T19:16:19.160
Link: CVE-2026-1457
No data.
OpenCVE Enrichment
No data.