Submit #766386: Tiandy video surveillance system 7.17.0 Unrestricted Upload of File with Dangerous Typeinfo

TitelTiandy video surveillance system 7.17.0 Unrestricted Upload of File with Dangerous Type
BeschreibungSince there is no validation of the file extension, attackers can upload files of any type (e.g., .jsp, .jspx, .exe, .sh, etc.). If the directory pointed to by CLS_Easy7_Types.file_pathis directly accessible via the web (e.g., under Tomcat's webappsdirectory) and the server configuration allows the execution of such scripts, an attacker could upload a webshell (such as a malicious JSP file) and directly access and execute the malicious code via a URL. This may lead to Remote Code Execution (RCE).
Quelle⚠️ https://my.feishu.cn/docx/P3Bgdl9BHocn66xCMpCcgCD7nhe?from=from_copylink
Benutzer
 Anonymous User
Einreichung24.02.2026 09:33 (vor 1 Monat)
Moderieren08.03.2026 12:23 (12 days later)
StatusAkzeptiert
VulDB Eintrag349764 [Tiandy Video Surveillance System 视频监控平台 7.17.0 CLS_REST_File.java uploadFile fileName erweiterte Rechte]
Punkte20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!