Submit #766386: Tiandy video surveillance system 7.17.0 Unrestricted Upload of File with Dangerous Typeinfo

TitleTiandy video surveillance system 7.17.0 Unrestricted Upload of File with Dangerous Type
DescriptionSince there is no validation of the file extension, attackers can upload files of any type (e.g., .jsp, .jspx, .exe, .sh, etc.). If the directory pointed to by CLS_Easy7_Types.file_pathis directly accessible via the web (e.g., under Tomcat's webappsdirectory) and the server configuration allows the execution of such scripts, an attacker could upload a webshell (such as a malicious JSP file) and directly access and execute the malicious code via a URL. This may lead to Remote Code Execution (RCE).
Source⚠️ https://my.feishu.cn/docx/P3Bgdl9BHocn66xCMpCcgCD7nhe?from=from_copylink
User
 Anonymous User
Submission02/24/2026 09:33 (1 month ago)
Moderation03/08/2026 12:23 (12 days later)
StatusAccepted
VulDB entry349764 [Tiandy Video Surveillance System 视频监控平台 7.17.0 CLS_REST_File.java uploadFile fileName unrestricted upload]
Points20

Might our Artificial Intelligence support you?

Check our Alexa App!