जमा करें #791277: Tenda CH22 V1.0.0.6(468) Path Traversalजानकारी

शीर्षकTenda CH22 V1.0.0.6(468) Path Traversal
विवरणA critical authentication bypass vulnerability exists in the Tenda CH22 router, specifically within the R7WebsSecurityHandlerfunction of the V1.0.0.6(468) firmware. This function acts as a security gatekeeper for all incoming HTTP requests. Its primary mechanism is a URL prefix whitelist (e.g., /public/, /lang/) meant to grant unauthenticated access to static resources. The function uses strncmp to check if the request URL begins with these trusted prefixes: e.g., if ( !strncmp(s1, "/public/", 8u) ... return 0;.However, the application fails to validate or canonicalize the subsequent part of the URL. An unauthenticated remote attacker can send a crafted HTTP request that starts with a whitelisted prefix but employs directory traversal sequences (../) to escape the restricted directory.For example, a request to `/public/../system_upgrade.asp` will satisfy the `strncmp` check (bypassing authentication) but will be resolved by the web server to the sensitive `system_upgrade.asp` page, granting full administrative access.
स्रोत⚠️ https://github.com/Litengzheng/vuldb_new/blob/main/CH22/vul_55/README.md
उपयोगकर्ता LtzHuster2 (UID 96397)
सबमिशन27/03/2026 04:44 PM (1 महीना पहले)
संयम09/04/2026 12:03 PM (13 days later)
स्थितिस्वीकृत
VulDB प्रविष्टि356515 [Tenda CH22 1.0.0.6(468) httpd R7WebsSecurityHandlerfunction निर्देशिका ट्रैवर्सल]
अंक20

Want to stay up to date on a daily basis?

Enable the mail alert feature now!