Authentication bypass in the password recovery feature of the local web interface across multiple VIGI camera models allows an attacker on the LAN to reset the admin password without verification by manipulating client-side state. Attackers can gain full administrative access to the device, compromising configuration and network security.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 22 Jan 2026 03:30:00 +0900

Type Values Removed Values Added
References

Thu, 22 Jan 2026 03:15:00 +0900

Type Values Removed Values Added
References

Sat, 17 Jan 2026 03:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 17 Jan 2026 02:30:00 +0900

Type Values Removed Values Added
Description Authentication bypass in the password recovery feature of the local web interface across multiple VIGI camera models allows an attacker on the LAN to reset the admin password without verification by manipulating client-side state. Attackers can gain full administrative access to the device, compromising configuration and network security.
Title Authentication Bypass in Password Recovery Feature via Local Web App on Multiple VIGI Cameras
Weaknesses CWE-287
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published:

Updated: 2026-01-21T17:53:30.225Z

Reserved: 2026-01-06T00:07:04.905Z

Link: CVE-2026-0629

cve-icon Vulnrichment

Updated: 2026-01-16T17:38:44.636Z

cve-icon NVD

Status : Received

Published: 2026-01-16T18:16:09.190

Modified: 2026-01-21T18:16:24.643

Link: CVE-2026-0629

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses