Full Story on:TP-Link has disclosed a high-severity authentication bypass vulnerability affecting its VIGI security camera lineup, allowing attackers on local networks to reset administrator passwords without verification.
The flaw lies in the password recovery feature of the local web interface, which is exploited via client-side state manipulation.
The vulnerability (CVE-2026-0629) enables threat actors positioned on the same local area network (LAN) to gain full administrative access to VIGI cameras by circumventing the password recovery authentication mechanism.
By manipulating client-side state variables during recovery, attackers bypass verification checks intended to prevent unauthorized password resets.
This attack vector is particularly concerning because it requires no prior authentication, no special privileges, and occurs entirely through local web interface interactions.
TP-Link Router Flaw Enables Authentication Bypass Through Password Recovery Mechanism
TP-Link has disclosed a high-severity authentication bypass vulnerability affecting its VIGI security camera lineup.
gbhackers.com
