Submeter #791217: Tenda i12 V1.0.0.11(3862) Path Traversalinformação

TítuloTenda i12 V1.0.0.11(3862) Path Traversal
DescriçãoA critical authentication bypass vulnerability exists in the Tenda i12 V1.0.0.11(3862) router, specifically within the R7WebsSecurityHandlerfunction of the V1.0.0.11(3862) firmware. This function acts as a security gatekeeper for all incoming HTTP requests. Its primary mechanism is a URL prefix whitelist (e.g., /public/, /lang/) meant to grant unauthenticated access to static resources. The function uses strncmp to check if the request URL begins with these trusted prefixes: e.g., if ( !strncmp(s1, "/public/", 8u) ... return 0;However, the application fails to validate or canonicalize the subsequent part of the URL. An unauthenticated remote attacker can send a crafted HTTP request that starts with a whitelisted prefix but employs directory traversal sequences (../) to escape the restricted directory.For example, a request to /public/../system_upgrade.asp will satisfy the strncmp check (bypassing authentication) but will be resolved by the web server to the sensitive system_upgrade.asp page, granting full administrative access.
Fonte⚠️ https://github.com/Litengzheng/vuldb_new/blob/main/i12/vul_110/README.md
Utilizador
 LtzHust2 (UID 95662)
Submissão27/03/2026 16h12 (há 18 dias)
Moderação08/04/2026 21h15 (12 days later)
EstadoAceite
Entrada VulDB356375 [Tenda i12 1.0.0.11(3862) HTTP Travessia de Diretório]
Pontos20

Do you want to use VulDB in your project?

Use the official API to access entries easily!