| Title | Tiandy Technologies Co., Ltd. Tiandy Easy7 Integrated Management Platform 7.17.0 SQL Injection |
|---|
| Description | A critical, multi-vector SQL injection vulnerability was identified in the rest/preSetTemplate/getRecByTemplateId endpoint of Tiandy Easy7 Integrated Management Platform. The id parameter is vulnerable to Union-based, Boolean-based, and Time-based injection techniques. An unauthenticated remote attacker can exploit this flaw to bypass all database security constraints, enabling high-speed extraction of the entire database, including administrative credentials and system configurations. The direct data leakage through Union-based queries poses the highest possible risk to confidentiality and integrity. |
|---|
| Source | ⚠️ https://my.feishu.cn/docx/UmmudBVvYoMwpIxUtTicjsS8nDe?from=from_copylink |
|---|
| User | 0menc (UID 75423) |
|---|
| Submission | 03/05/2026 04:09 (2 months ago) |
|---|
| Moderation | 03/16/2026 17:34 (12 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 351294 [Tiandy Easy7 Integrated Management Platform up to 7.17.0 getRecByTemplateId ID sql injection] |
|---|
| Points | 20 |
|---|