CVE-2026-0629

N/A Unknown

📋 TL;DR

This authentication bypass vulnerability in VIGI camera models allows attackers on the same local network to reset the admin password without verification by manipulating client-side state. Attackers can gain full administrative access to compromise device configuration and network security. All users of affected VIGI camera models with the vulnerable firmware are impacted.

💻 Affected Systems

Products:
  • Multiple VIGI camera models (specific models not detailed in provided references)
Versions: Specific vulnerable firmware versions not detailed in provided references
Operating Systems: Embedded camera firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations with the vulnerable firmware are affected. The vulnerability affects the local web interface accessible over LAN.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full administrative takeover of camera devices, enabling attackers to reconfigure devices, disable security features, access video feeds, pivot to other network resources, and potentially install persistent malware.

🟠

Likely Case

Unauthorized access to camera administration interface allowing configuration changes, disabling of security features, and potential access to video streams.

🟢

If Mitigated

Limited impact if cameras are isolated on separate VLANs with strict network segmentation and access controls preventing lateral movement.

🌐 Internet-Facing: LOW - The vulnerability requires LAN access to the camera's local web interface, though internet-facing cameras could still be vulnerable if attackers gain initial network access.
🏢 Internal Only: HIGH - Attackers with any level of internal network access can exploit this vulnerability to gain administrative control of affected cameras.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires LAN access but no authentication. The vulnerability involves manipulating client-side state in the password recovery feature.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Specific version not provided in references; check vendor firmware updates

Vendor Advisory: https://www.tp-link.com/us/support/faq/4906/

Restart Required: Yes

Instructions:

1. Visit the VIGI support download page for your region. 2. Download the latest firmware for your specific camera model. 3. Log into the camera's web interface. 4. Navigate to System > Maintenance > Firmware Upgrade. 5. Upload and install the firmware update. 6. The camera will reboot automatically.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate cameras on a separate VLAN with strict access controls to prevent lateral movement from compromised devices.

Disable Local Web Interface

all

If supported by your camera model and operational requirements, disable the local web interface and manage cameras through centralized management systems only.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate cameras from other critical network resources
  • Enable strong authentication mechanisms and disable password recovery feature if possible

🔍 How to Verify

Check if Vulnerable:

Check if your camera model is listed in VIGI security advisories and verify firmware version against known vulnerable versions. Attempt to access password recovery feature to see if proper verification is required.

Check Version:

Log into camera web interface > System > Status to view firmware version

Verify Fix Applied:

After updating firmware, verify that password recovery now requires proper authentication and verification steps. Test that client-side state manipulation no longer allows password reset.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful password reset
  • Unusual admin password change events
  • Access to password recovery endpoint from unexpected IP addresses

Network Indicators:

  • HTTP POST requests to password reset endpoints without proper authentication
  • Unusual traffic patterns to camera administration interfaces

SIEM Query:

source="camera_logs" AND (event="password_reset" OR event="admin_password_change") AND NOT user="authorized_admin"

🔗 References

📤 Share & Export