| タイトル | Tenda TDSEE mobile application 1.7.12 Authorization Bypass |
|---|
| 説明 | In the TDSEE app, I found there was no rate limit in the confirmation code requests in the password reset functionality, resulting in account takeover.
Knowing the victim’s email, the attacker could change the account password by going through the 6-digit password reset confirmation code.
In the application version 1.7.15, the vendor released a patch, setting a limit on the number of requests per second.
Sources:
https://blog.kevgen.ru/posts/account_takeover_in_tdsee_app/
https://github.com/k3vg3n/researches/blob/main/Account_takeover_in_TDSEE_app.md |
|---|
| ソース | ⚠️ https://blog.kevgen.ru/posts/account_takeover_in_tdsee_app/ |
|---|
| ユーザー | k3vg3n (UID 86142) |
|---|
| 送信 | 2025年06月06日 19:44 (11 月 ago) |
|---|
| モデレーション | 2025年06月08日 15:30 (2 days later) |
|---|
| ステータス | 承諾済み |
|---|
| VulDBエントリ | 311623 [Tenda TDSEE App 迄 1.7.12 Password Reset Confirmation Code /app/ConfirmSmsCode 情報漏えい] |
|---|
| ポイント | 20 |
|---|