Critical TP-Link VIGI camera flaw allowed remote takeover of surveillance systems
Overview
TP-Link has addressed a serious vulnerability in its VIGI C and VIGI InSight camera models that allowed remote access to surveillance systems. This flaw, identified as CVE-2026-0629, has a CVSS score of 8.7, indicating high severity. Over 32 models were affected, with more than 2,500 devices exposed to the internet and potentially at risk of being hacked. Attackers could exploit this vulnerability to bypass local network restrictions, putting users' security and privacy in jeopardy. The fix for this issue is crucial for ensuring the safety of surveillance operations for both businesses and individuals who rely on these cameras.
Key Takeaways
- Affected Systems: TP-Link VIGI C and VIGI InSight camera models (over 32 models identified), 2,500 internet-exposed devices.
- Action Required: Users should update their camera firmware to the latest version provided by TP-Link to close the vulnerability.
- Timeline: Newly disclosed
Original Article Summary
TP-Link fixed a critical flaw that exposed over 32 VIGI C and VIGI InSight camera models to remote hacking, with over 2,500 internet-exposed devices identified. TP-Link fixed a high-severity flaw, tracked as CVE-2026-0629 (CVSS score 8.7), affecting over 32 VIGI C and VIGI InSight camera models. The vulnerability lets attackers on a local network bypass […]
Impact
TP-Link VIGI C and VIGI InSight camera models (over 32 models identified), 2,500 internet-exposed devices.
Exploitation Status
No active exploitation has been reported at this time. However, organizations should still apply patches promptly as proof-of-concept code may exist.
Timeline
Newly disclosed
Remediation
Users should update their camera firmware to the latest version provided by TP-Link to close the vulnerability. Additionally, it is advisable to regularly check for firmware updates and ensure that devices are not unnecessarily exposed to the internet.
Additional Information
This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.
Related Topics: This incident relates to CVE, Exploit, Vulnerability, and 1 more.