| Titre | Tenda TDSEE mobile application 1.7.12 Authorization Bypass |
|---|
| Description | In the TDSEE app, I found there was no rate limit in the confirmation code requests in the password reset functionality, resulting in account takeover.
Knowing the victim’s email, the attacker could change the account password by going through the 6-digit password reset confirmation code.
In the application version 1.7.15, the vendor released a patch, setting a limit on the number of requests per second.
Sources:
https://blog.kevgen.ru/posts/account_takeover_in_tdsee_app/
https://github.com/k3vg3n/researches/blob/main/Account_takeover_in_TDSEE_app.md |
|---|
| La source | ⚠️ https://blog.kevgen.ru/posts/account_takeover_in_tdsee_app/ |
|---|
| Utilisateur | k3vg3n (UID 86142) |
|---|
| Soumission | 06/06/2025 19:44 (il y a 11 mois) |
|---|
| Modérer | 08/06/2025 15:30 (2 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 311623 [Tenda TDSEE App jusqu’à 1.7.12 Password Reset Confirmation Code /app/ConfirmSmsCode divulgation d'information] |
|---|
| Points | 20 |
|---|