| 제목 | Tenda i9 V1.0.0.5(2204) Absolute Path Traversal |
|---|
| 설명 | A critical authentication bypass vulnerability exists in the Tenda i9 router, specifically within the R7WebsSecurityHandlerfunction of the V1.0.0.5(2204) firmware. This function acts as a security gatekeeper for all incoming HTTP requests. Its primary mechanism is a URL prefix whitelist (e.g., /public/, /lang/) meant to grant unauthenticated access to static resources. The function uses strncmp to check if the request URL begins with these trusted prefixes: e.g., if ( !strncmp(s1, "/public/", 8u) ... return 0;.However, the application fails to validate or canonicalize the subsequent part of the URL. An unauthenticated remote attacker can send a crafted HTTP request that starts with a whitelisted prefix but employs directory traversal sequences (../) to escape the restricted directory.For example, a request to /public/../../system_upgrade.asp will satisfy the strncmp check (bypassing authentication) but will be resolved by the web server to the sensitive system_upgrade.asp page, granting full administrative access. |
|---|
| 원천 | ⚠️ https://github.com/Litengzheng/vuldb_new/blob/main/M3/vul_80/README.md |
|---|
| 사용자 | LtzHuster (UID 95786) |
|---|
| 제출 | 2026. 04. 07. AM 02:32 (21 날 ago) |
|---|
| 모더레이션 | 2026. 04. 25. PM 05:38 (19 days later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 359616 [Tenda i9 1.0.0.5(2204) HTTP R7WebsSecurityHandlerfunction 디렉토리 순회] |
|---|
| 포인트들 | 20 |
|---|