| Title | Tenda CH22 V1.0.0.6(468) Path Traversal |
|---|
| Description | A critical authentication bypass vulnerability exists in the Tenda CH22 router, specifically within the R7WebsSecurityHandlerfunction of the V1.0.0.6(468) firmware. This function acts as a security gatekeeper for all incoming HTTP requests. Its primary mechanism is a URL prefix whitelist (e.g., /public/, /lang/) meant to grant unauthenticated access to static resources. The function uses strncmp to check if the request URL begins with these trusted prefixes: e.g., if ( !strncmp(s1, "/public/", 8u) ... return 0;.However, the application fails to validate or canonicalize the subsequent part of the URL. An unauthenticated remote attacker can send a crafted HTTP request that starts with a whitelisted prefix but employs directory traversal sequences (../) to escape the restricted directory.For example, a request to `/public/../system_upgrade.asp` will satisfy the `strncmp` check (bypassing authentication) but will be resolved by the web server to the sensitive `system_upgrade.asp` page, granting full administrative access. |
|---|
| Source | ⚠️ https://github.com/Litengzheng/vuldb_new/blob/main/CH22/vul_55/README.md |
|---|
| User | LtzHuster2 (UID 96397) |
|---|
| Submission | 03/27/2026 16:44 (14 days ago) |
|---|
| Moderation | 04/09/2026 12:03 (13 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 356515 [Tenda CH22 1.0.0.6(468) httpd R7WebsSecurityHandlerfunction path traversal] |
|---|
| Points | 20 |
|---|