Submit #699144: Chanjet Chanjet T+ V1.0 SQL Injectioninfo

TitleChanjet Chanjet T+ V1.0 SQL Injection
DescriptionVulnerability Description: A SQL injection vulnerability exists in the Changjetong T+ Load-Ufida.T.SM.UIP.ashx file. The vulnerable route is /tplus/ajaxpro/Ufida.T.SM.UIP.MultiCompanySettingController,Ufida.T.SM.UIP.ashx?method=Load, and the vulnerable parameter is the currentAccId parameter submitted via POST.
Source⚠️ https://github.com/hacker-routing/Changjetong-T-/issues/1
User
 routing_love (UID 92805)
Submission11/21/2025 04:06 (5 months ago)
Moderation12/06/2025 15:26 (15 days later)
StatusAccepted
VulDB entry334610 [Chanjet TPlus up to 20251121 currentAccId sql injection]
Points19

Do you want to use VulDB in your project?

Use the official API to access entries easily!