CVE-2026-1457

Source
https://cve.org/CVERecord?id=CVE-2026-1457
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-1457.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-1457
Published
2026-01-29T19:16:19.160Z
Modified
2026-03-13T07:57:10.218644Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An authenticated buffer handling flaw in TP-Link VIGI C385 V1 Web API lacking input sanitization, may allow memory corruption leading to remote code execution. Authenticated attackers may trigger buffer overflow and potentially execute arbitrary code with elevated privileges.

References

Affected packages

Git /

Affected ranges

Database specific

unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "fixed": "3.1.1"
            }
        ]
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-1457.json"