Click to skip the navigation bar

Security Advisory on Authenticated RCE Vulnerability Due to Buffer Overflow on VIGI C385 (CVE-2026-1457)

Security Advisory
Updated 01-29-2026 18:49:34 PM Number of views for this article102

Vulnerability and Impact Description:

CVE-2026-1457:

An authenticated buffer handling flaw in TP-Link VIGI C385 V1 Web API lacking input sanitization, may allow memory corruption leading to remote code execution. Authenticated attackers may trigger buffer overflow and potentially execute arbitrary code with elevated privileges.

CVSS v4.0 Score: 8.5 / High

CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Products/Versions and Fixes:

Affected Product Model

Affected Version

VIGI C385 V1

< 3.1.1 Build 251124 Rel.50371n

Recommendations:

We strongly recommend that users with affected devices take the following actions:

  1. Download and update to the latest firmware version to fix the vulnerabilities.

EN: https://www.tp-link.com/en/support/download/vigi-c385/v1/#Firmware

KR: https://www.tp-link.com/kr/support/download/vigi-c385/v1/#Firmware

This product is not sold in the US.

Disclaimer:

If you do not take all recommended actions, this vulnerability will remain. TP-Link cannot bear any responsibility for consequences that could have been avoided by following this advisory.

Looking for More

Is this faq useful?

Your feedback helps improve this site.

Community

TP-Link Community

Still need help? Search for answers, ask questions, and get help from TP-Link experts and other users around the world.

Visit the Community >