| Title | Tenda TDSEE mobile application 1.7.12 Authorization Bypass |
|---|
| Description | In the TDSEE app, I found there was no rate limit in the confirmation code requests in the password reset functionality, resulting in account takeover.
Knowing the victim’s email, the attacker could change the account password by going through the 6-digit password reset confirmation code.
In the application version 1.7.15, the vendor released a patch, setting a limit on the number of requests per second.
Sources:
https://blog.kevgen.ru/posts/account_takeover_in_tdsee_app/
https://github.com/k3vg3n/researches/blob/main/Account_takeover_in_TDSEE_app.md |
|---|
| Source | ⚠️ https://blog.kevgen.ru/posts/account_takeover_in_tdsee_app/ |
|---|
| User | k3vg3n (UID 86142) |
|---|
| Submission | 06/06/2025 07:44 PM (9 months ago) |
|---|
| Moderation | 06/08/2025 03:30 PM (2 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 311623 [Tenda TDSEE App up to 1.7.12 Password Reset Confirmation Code /app/ConfirmSmsCode excessive authentication] |
|---|
| Points | 20 |
|---|