| Titel | Tenda i12 V1.0.0.11(3862) Path Traversal |
|---|
| Beschreibung | A critical authentication bypass vulnerability exists in the Tenda i12 V1.0.0.11(3862) router, specifically within the R7WebsSecurityHandlerfunction of the V1.0.0.11(3862) firmware. This function acts as a security gatekeeper for all incoming HTTP requests. Its primary mechanism is a URL prefix whitelist (e.g., /public/, /lang/) meant to grant unauthenticated access to static resources. The function uses strncmp to check if the request URL begins with these trusted prefixes: e.g., if ( !strncmp(s1, "/public/", 8u) ... return 0;However, the application fails to validate or canonicalize the subsequent part of the URL. An unauthenticated remote attacker can send a crafted HTTP request that starts with a whitelisted prefix but employs directory traversal sequences (../) to escape the restricted directory.For example, a request to /public/../system_upgrade.asp will satisfy the strncmp check (bypassing authentication) but will be resolved by the web server to the sensitive system_upgrade.asp page, granting full administrative access. |
|---|
| Quelle | ⚠️ https://github.com/Litengzheng/vuldb_new/blob/main/i12/vul_110/README.md |
|---|
| Benutzer | LtzHust2 (UID 95662) |
|---|
| Einreichung | 27.03.2026 16:12 (vor 19 Tagen) |
|---|
| Moderieren | 08.04.2026 21:15 (12 days later) |
|---|
| Status | Akzeptiert |
|---|
| VulDB Eintrag | 356375 [Tenda i12 1.0.0.11(3862) HTTP Directory Traversal] |
|---|
| Punkte | 20 |
|---|