{"uuid": "e651be34-b4db-4d9d-a746-15699bfe7264", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "name": "TP-Link Systems Inc. VIGI Series IP Camera", "description": "Ref: [TP-Link Systems Inc. VIGI Series IP Camera ](https://www.cisa.gov/news-events/ics-advisories/icsa-26-036-01)\n\n# TP-Link Systems Inc. VIGI Series IP Camera | CISA\n[**View CSAF**](https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-036-01.json)\n\nSummary\n-------\n\n**Successful exploitation of this vulnerability could result in unauthorized users gaining administrative access to affected closed circuit television cameras.**\n\nThe following versions of TP-Link Systems Inc. VIGI Series IP Camera are affected:\n\n*   VIGI Cx45 Series Models C345, C445 &lt;=3.1.0\\_Build\\_250820\\_Rel.57668n (CVE-2026-0629)\n*   VIGI Cx55 Series Models C355, C455 &lt;=3.1.0\\_Build\\_250820\\_Rel.58873n (CVE-2026-0629)\n*   VIGI Cx85 Series Models C385, C485 &lt;=3.0.2\\_Build\\_250630\\_Rel.71279n (CVE-2026-0629)\n*   VIGI C340S Series &lt;=3.1.0\\_Build\\_250625\\_Rel.65381n (CVE-2026-0629)\n*   VIGI C540S Series Models C540S, EasyCam C540S &lt;=3.1.0\\_Build\\_250625\\_Rel.66601n (CVE-2026-0629)\n*   VIGI C540V Series &lt;=2.1.0\\_Build\\_250702\\_Rel.54300n (CVE-2026-0629)\n*   VIGI C250 Series &lt;=2.1.0\\_Build\\_250702\\_Rel.54301n (CVE-2026-0629)\n*   VIGI Cx50 Series Models C350, C450 &lt;=2.1.0\\_Build\\_250702\\_Rel.54294n (CVE-2026-0629)\n*   VIGI Cx20I (1.0) Series Models C220I 1.0, C320I 1.0, C420I 1.0 &lt;=2.1.0\\_Build\\_251014\\_Rel.58331n (CVE-2026-0629)\n*   VIGI Cx20I (1.20) Series Models C220I 1.20, C320I 1.20, C420I 1.20 &lt;=2.1.0\\_Build\\_250701\\_Rel.44071n (CVE-2026-0629)\n*   VIGI Cx30I (1.0) Series Models C230I 1.0, C330I 1.0, C430I 1.0 &lt;=2.1.0\\_Build\\_250701\\_Rel.45506n (CVE-2026-0629)\n*   VIGI Cx30I (1.20) Series Models C230I 1.20, C330I 1.20, C430I 1.20 &lt;=2.1.0\\_Build\\_250701\\_Rel.44555n (CVE-2026-0629)\n*   VIGI Cx30 (1.0) Series Models C230 1.0, C330 1.0, C430 1.0 &lt;=2.1.0\\_Build\\_250701\\_Rel.46796n (CVE-2026-0629)\n*   VIGI Cx30 (1.20) Series Models C230 1.20, C330 1.20, C430 1.20 &lt;=2.1.0\\_Build\\_250701\\_Rel.46796n (CVE-2026-0629)\n*   VIGI Cx40I (1.0) Series Models C240I 1.0, C340I 1.0, C440I 1.0 &lt;=2.1.0\\_Build\\_250701\\_Rel.46003n (CVE-2026-0629)\n*   VIGI Cx40I (1.20) Series Models C240I 1.20, C340I 1.20, C440I 1.20 &lt;=2.1.0\\_Build\\_250701\\_Rel.45041n (CVE-2026-0629)\n*   VIGI C230I Mini Series &lt;=2.1.0\\_Build\\_250701\\_Rel.47570n (CVE-2026-0629)\n*   VIGI C240 1.0 Series &lt;=2.1.0\\_Build\\_250701\\_Rel.48425n (CVE-2026-0629)\n*   VIGI C340 2.0 Series &lt;=2.1.0\\_Build\\_250701\\_Rel.49304n (CVE-2026-0629)\n*   VIGI C440 2.0 Series &lt;=2.1.0\\_Build\\_250701\\_Rel.49778n (CVE-2026-0629)\n*   VIGI C540 2.0 Series &lt;=2.1.0\\_Build\\_250701\\_Rel.50397n (CVE-2026-0629)\n*   VIGI C540\u20114G Series &lt;=2.2.0\\_Build\\_250826\\_Rel.56808n (CVE-2026-0629)\n*   VIGI Cx40\u2011W Series Models C340\u2011W 2.0/2.20, C440\u2011W 2.0, C540\u2011W 2.0 &lt;=2.1.1\\_Build\\_250717 (CVE-2026-0629)\n*   VIGI Cx20 Series Models C320, C420 &lt;=2.1.0\\_Build\\_250701\\_Rel.39597n (CVE-2026-0629)\n*   VIGI InSight Sx45 Series Models S245, S345, S445 &lt;=3.1.0\\_Build\\_250820\\_Rel.57668n (CVE-2026-0629)\n*   VIGI InSight Sx55 Series Models S355, S455 &lt;=3.1.0\\_Build\\_250820\\_Rel.58873n (CVE-2026-0629)\n*   VIGI InSight Sx85 Series Models S285, S385 &lt;=3.0.2\\_Build\\_250630\\_Rel.71279n (CVE-2026-0629)\n*   VIGI InSight Sx45ZI Series Models S245ZI, S345ZI, S445ZI &lt;=1.2.0\\_Build\\_250820\\_Rel.60930n (CVE-2026-0629)\n*   VIGI InSight Sx85PI Series Models S385PI, S485PI &lt;=1.2.0\\_Build\\_250827\\_Rel.66817n (CVE-2026-0629)\n*   VIGI InSight S655I Series &lt;=1.1.1\\_Build\\_250625\\_Rel.64224n (CVE-2026-0629)\n*   VIGI InSight S345\u20114G Series &lt;=2.1.0\\_Build\\_250725\\_Rel.36867n (CVE-2026-0629)\n*   VIGI InSight Sx25 Series Models S225, S325, S425 &lt;=1.1.0\\_Build\\_250630\\_Rel.39597n (CVE-2026-0629)\n\n\n|CVSS  |Vendor              |Equipment                                 |Vulnerabilities        |\n|------|--------------------|------------------------------------------|-----------------------|\n|v3 8.8|TP-Link Systems Inc.|TP-Link Systems Inc. VIGI Series IP Camera|Improper Authentication|\n\n\n### Background\n\n*   **Critical Infrastructure Sectors:** Commercial Facilities\n*   **Countries/Areas Deployed:** Worldwide\n*   **Company Headquarters Location:** China\n\n* * *\n\nVulnerabilities\n---------------\n\n[Expand All +](#)\n\n### [CVE-2026-0629](#)\n\nAn authentication bypass in the password recovery feature of the local web interface across multiple VIGI camera models allows an attacker on the LAN to reset the admin password without verification by manipulating client-side state. Attackers can gain full administrative access to the device, compromising configuration and network security.\n\n[View CVE Details](https://www.cve.org/CVERecord?id=CVE-2026-0629)\n\n* * *\n\n#### Affected Products\n\n##### TP-Link Systems Inc. VIGI Series IP Camera\n\n**Vendor:**  \nTP-Link Systems Inc.\n\n**Product Version:**  \nTP-Link Systems Inc. VIGI Cx45 Series Models C345, C445: &lt;=3.1.0\\_Build\\_250820\\_Rel.57668n, TP-Link Systems Inc. VIGI Cx55 Series Models C355, C455: &lt;=3.1.0\\_Build\\_250820\\_Rel.58873n, TP-Link Systems Inc. VIGI Cx85 Series Models C385, C485: &lt;=3.0.2\\_Build\\_250630\\_Rel.71279n, TP-Link Systems Inc. VIGI C340S Series: &lt;=3.1.0\\_Build\\_250625\\_Rel.65381n, TP-Link Systems Inc. VIGI C540S Series Models C540S, EasyCam C540S: &lt;=3.1.0\\_Build\\_250625\\_Rel.66601n, TP-Link Systems Inc. VIGI C540V Series: &lt;=2.1.0\\_Build\\_250702\\_Rel.54300n, TP-Link Systems Inc. VIGI C250 Series: &lt;=2.1.0\\_Build\\_250702\\_Rel.54301n, TP-Link Systems Inc. VIGI Cx50 Series Models C350, C450: &lt;=2.1.0\\_Build\\_250702\\_Rel.54294n, TP-Link Systems Inc. VIGI Cx20I (1.0) Series Models C220I 1.0, C320I 1.0, C420I 1.0: &lt;=2.1.0\\_Build\\_251014\\_Rel.58331n, TP-Link Systems Inc. VIGI Cx20I (1.20) Series Models C220I 1.20, C320I 1.20, C420I 1.20: &lt;=2.1.0\\_Build\\_250701\\_Rel.44071n, TP-Link Systems Inc. VIGI Cx30I (1.0) Series Models C230I 1.0, C330I 1.0, C430I 1.0: &lt;=2.1.0\\_Build\\_250701\\_Rel.45506n, TP-Link Systems Inc. VIGI Cx30I (1.20) Series Models C230I 1.20, C330I 1.20, C430I 1.20: &lt;=2.1.0\\_Build\\_250701\\_Rel.44555n, TP-Link Systems Inc. VIGI Cx30 (1.0) Series Models C230 1.0, C330 1.0, C430 1.0: &lt;=2.1.0\\_Build\\_250701\\_Rel.46796n, TP-Link Systems Inc. VIGI Cx30 (1.20) Series Models C230 1.20, C330 1.20, C430 1.20: &lt;=2.1.0\\_Build\\_250701\\_Rel.46796n, TP-Link Systems Inc. VIGI Cx40I (1.0) Series Models C240I 1.0, C340I 1.0, C440I 1.0: &lt;=2.1.0\\_Build\\_250701\\_Rel.46003n, TP-Link Systems Inc. VIGI Cx40I (1.20) Series Models C240I 1.20, C340I 1.20, C440I 1.20: &lt;=2.1.0\\_Build\\_250701\\_Rel.45041n, TP-Link Systems Inc. VIGI C230I Mini Series: &lt;=2.1.0\\_Build\\_250701\\_Rel.47570n, TP-Link Systems Inc. VIGI C240 1.0 Series: &lt;=2.1.0\\_Build\\_250701\\_Rel.48425n, TP-Link Systems Inc. VIGI C340 2.0 Series: &lt;=2.1.0\\_Build\\_250701\\_Rel.49304n, TP-Link Systems Inc. VIGI C440 2.0 Series: &lt;=2.1.0\\_Build\\_250701\\_Rel.49778n, TP-Link Systems Inc. VIGI C540 2.0 Series: &lt;=2.1.0\\_Build\\_250701\\_Rel.50397n, TP-Link Systems Inc. VIGI C540\u20114G Series: &lt;=2.2.0\\_Build\\_250826\\_Rel.56808n, TP-Link Systems Inc. VIGI Cx40\u2011W Series Models C340\u2011W 2.0/2.20, C440\u2011W 2.0, C540\u2011W 2.0: &lt;=2.1.1\\_Build\\_250717, TP-Link Systems Inc. VIGI Cx20 Series Models C320, C420: &lt;=2.1.0\\_Build\\_250701\\_Rel.39597n, TP-Link Systems Inc. VIGI InSight Sx45 Series Models S245, S345, S445: &lt;=3.1.0\\_Build\\_250820\\_Rel.57668n, TP-Link Systems Inc. VIGI InSight Sx55 Series Models S355, S455: &lt;=3.1.0\\_Build\\_250820\\_Rel.58873n, TP-Link Systems Inc. VIGI InSight Sx85 Series Models S285, S385: &lt;=3.0.2\\_Build\\_250630\\_Rel.71279n, TP-Link Systems Inc. VIGI InSight Sx45ZI Series Models S245ZI, S345ZI, S445ZI: &lt;=1.2.0\\_Build\\_250820\\_Rel.60930n, TP-Link Systems Inc. VIGI InSight Sx85PI Series Models S385PI, S485PI: &lt;=1.2.0\\_Build\\_250827\\_Rel.66817n, TP-Link Systems Inc. VIGI InSight S655I Series: &lt;=1.1.1\\_Build\\_250625\\_Rel.64224n, TP-Link Systems Inc. VIGI InSight S345\u20114G Series: &lt;=2.1.0\\_Build\\_250725\\_Rel.36867n, TP-Link Systems Inc. VIGI InSight Sx25 Series Models S225, S325, S425: &lt;=1.1.0\\_Build\\_250630\\_Rel.39597n\n\n**Product Status:**  \nknown\\_affected\n\n**Relevant CWE:** [CWE-287 Improper Authentication](https://cwe.mitre.org/data/definitions/287.html)\n\n* * *\n\n#### Metrics\n\n* * *\n\nAcknowledgments\n---------------\n\n*   Arko Dhar of Redinent Innovations reported this vulnerability to CISA\n\n* * *\n\nLegal Notice and Terms of Use\n-----------------------------\n\nThis product is provided subject to this Notification (https://www.cisa.gov/notification) and this Privacy &amp; Use policy (https://www.cisa.gov/privacy-policy).\n\n* * *\n\nRecommended Practices\n---------------------\n\nCISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability, such as:\n\nMinimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the Internet.\n\nLocate control system networks and remote devices behind firewalls and isolating them from business networks.\n\nWhen remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.\n\nCISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\n\nCISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.\n\nCISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.\n\nAdditional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\n\nOrganizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.\n\nNo known public exploitation specifically targeting this vulnerability has been reported to CISA at this time. This vulnerability is not exploitable remotely.\n\n* * *\n\nRevision History\n----------------\n\n*   **Initial Release Date:** 2026-02-05\n\n\n|Date      |Revision|Summary            |\n|----------|--------|-------------------|\n|2026-02-05|1       |Initial Publication|\n\n\n* * *\n\nLegal Notice and Terms of Use\n-----------------------------", "creation_timestamp": "2026-02-05T20:47:03.242838+00:00", "timestamp": "2026-02-05T20:47:03.242838+00:00", "related_vulnerabilities": ["CVE-2026-0629"], "author": {"login": "adulau", "name": "Alexandre Dulaunoy", "uuid": "c933734a-9be8-4142-889e-26e95c752803"}}
