Submeter #766386: Tiandy video surveillance system 7.17.0 Unrestricted Upload of File with Dangerous Typeinformação

TítuloTiandy video surveillance system 7.17.0 Unrestricted Upload of File with Dangerous Type
DescriçãoSince there is no validation of the file extension, attackers can upload files of any type (e.g., .jsp, .jspx, .exe, .sh, etc.). If the directory pointed to by CLS_Easy7_Types.file_pathis directly accessible via the web (e.g., under Tomcat's webappsdirectory) and the server configuration allows the execution of such scripts, an attacker could upload a webshell (such as a malicious JSP file) and directly access and execute the malicious code via a URL. This may lead to Remote Code Execution (RCE).
Fonte⚠️ https://my.feishu.cn/docx/P3Bgdl9BHocn66xCMpCcgCD7nhe?from=from_copylink
Utilizador
 Anonymous User
Submissão24/02/2026 09h33 (há 1 mês)
Moderação08/03/2026 12h23 (12 days later)
EstadoAceite
Entrada VulDB349764 [Tiandy Video Surveillance System 视频监控平台 7.17.0 CLS_REST_File.java uploadFile fileName Elevação de Privilégios]
Pontos20

Do you need the next level of professionalism?

Upgrade your account now!