제출 #798479: Tenda i9 V1.0.0.5(2204) Absolute Path Traversal정보

제목Tenda i9 V1.0.0.5(2204) Absolute Path Traversal
설명A critical authentication bypass vulnerability exists in the Tenda i9 router, specifically within the R7WebsSecurityHandlerfunction of the V1.0.0.5(2204) firmware. This function acts as a security gatekeeper for all incoming HTTP requests. Its primary mechanism is a URL prefix whitelist (e.g., /public/, /lang/) meant to grant unauthenticated access to static resources. The function uses strncmp to check if the request URL begins with these trusted prefixes: e.g., if ( !strncmp(s1, "/public/", 8u) ... return 0;.However, the application fails to validate or canonicalize the subsequent part of the URL. An unauthenticated remote attacker can send a crafted HTTP request that starts with a whitelisted prefix but employs directory traversal sequences (../) to escape the restricted directory.For example, a request to /public/../../system_upgrade.asp will satisfy the strncmp check (bypassing authentication) but will be resolved by the web server to the sensitive system_upgrade.asp page, granting full administrative access.
원천⚠️ https://github.com/Litengzheng/vuldb_new/blob/main/M3/vul_80/README.md
사용자
 LtzHuster (UID 95786)
제출2026. 04. 07. AM 02:32 (21 날 ago)
모더레이션2026. 04. 25. PM 05:38 (19 days later)
상태수락
VulDB 항목359616 [Tenda i9 1.0.0.5(2204) HTTP R7WebsSecurityHandlerfunction 디렉토리 순회]
포인트들20

Want to stay up to date on a daily basis?

Enable the mail alert feature now!