Enviar #766386: Tiandy video surveillance system 7.17.0 Unrestricted Upload of File with Dangerous Typeinformación

TítuloTiandy video surveillance system 7.17.0 Unrestricted Upload of File with Dangerous Type
DescripciónSince there is no validation of the file extension, attackers can upload files of any type (e.g., .jsp, .jspx, .exe, .sh, etc.). If the directory pointed to by CLS_Easy7_Types.file_pathis directly accessible via the web (e.g., under Tomcat's webappsdirectory) and the server configuration allows the execution of such scripts, an attacker could upload a webshell (such as a malicious JSP file) and directly access and execute the malicious code via a URL. This may lead to Remote Code Execution (RCE).
Fuente⚠️ https://my.feishu.cn/docx/P3Bgdl9BHocn66xCMpCcgCD7nhe?from=from_copylink
Usuario
 Anonymous User
Sumisión2026-02-24 09:33 (hace 1 mes)
Moderación2026-03-08 12:23 (12 days later)
EstadoAceptado
Entrada de VulDB349764 [Tiandy Video Surveillance System 视频监控平台 7.17.0 CLS_REST_File.java uploadFile fileName escalada de privilegios]
Puntos20

Might our Artificial Intelligence support you?

Check our Alexa App!