| Title | Chanjet Chanjet T+ V1.0 SQL Injection |
|---|
| Description | Vulnerability Description:
A SQL injection vulnerability exists in the Changjetong T+ Load-Ufida.T.SM.UIP.ashx file. The vulnerable route is /tplus/ajaxpro/Ufida.T.SM.UIP.MultiCompanySettingController,Ufida.T.SM.UIP.ashx?method=Load, and the vulnerable parameter is the currentAccId parameter submitted via POST.
|
|---|
| Source | ⚠️ https://github.com/hacker-routing/Changjetong-T-/issues/1 |
|---|
| User | routing_love (UID 92805) |
|---|
| Submission | 11/21/2025 04:06 (5 months ago) |
|---|
| Moderation | 12/06/2025 15:26 (15 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 334610 [Chanjet TPlus up to 20251121 currentAccId sql injection] |
|---|
| Points | 19 |
|---|