CVE-2026-3797

A security vulnerability has been detected in Tiandy Video Surveillance System 视频监控平台 7.17.0. The impacted element is the function uploadFile of the file /src/com/tiandy/easy7/core/rest/CLS_REST_File.java. The manipulation of the argument fileName leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://my.feishu.cn/docx/P3Bgdl9BHocn66xCMpCcgCD7nhe?from=from_copylink Permissions Required
https://vuldb.com/?ctiid.349764 Permissions Required VDB Entry
https://vuldb.com/?id.349764 Third Party Advisory VDB Entry
https://vuldb.com/?submit.766386 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tiandy:video_surveillance_system_firmware:7.17.0:*:*:*:*:*:*:*
cpe:2.3:h:tiandy:video_surveillance_system:-:*:*:*:*:*:*:*

History

10 Mar 2026, 18:48

Type Values Removed Values Added
References () https://my.feishu.cn/docx/P3Bgdl9BHocn66xCMpCcgCD7nhe?from=from_copylink - () https://my.feishu.cn/docx/P3Bgdl9BHocn66xCMpCcgCD7nhe?from=from_copylink - Permissions Required
References () https://vuldb.com/?ctiid.349764 - () https://vuldb.com/?ctiid.349764 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.349764 - () https://vuldb.com/?id.349764 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.766386 - () https://vuldb.com/?submit.766386 - Third Party Advisory, VDB Entry
First Time Tiandy
Tiandy video Surveillance System Firmware
Tiandy video Surveillance System
Summary
  • (es) Se ha detectado una vulnerabilidad de seguridad en el Sistema de Videovigilancia Tiandy ?????? 7.17.0. El elemento afectado es la función uploadFile del archivo /src/com/tiandy/easy7/core/rest/CLS_REST_File.java. La manipulación del argumento fileName conduce a una carga sin restricciones. El ataque puede ser iniciado de forma remota. El exploit ha sido divulgado públicamente y puede ser utilizado. Se contactó al proveedor con antelación sobre esta divulgación, pero no respondió de ninguna manera.
CPE cpe:2.3:o:tiandy:video_surveillance_system_firmware:7.17.0:*:*:*:*:*:*:*
cpe:2.3:h:tiandy:video_surveillance_system:-:*:*:*:*:*:*:*

09 Mar 2026, 04:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-09 04:16

Updated : 2026-03-10 18:48


NVD link : CVE-2026-3797

Mitre link : CVE-2026-3797

CVE.ORG link : CVE-2026-3797


JSON object : View

Products Affected

tiandy

  • video_surveillance_system_firmware
  • video_surveillance_system
CWE
CWE-284

Improper Access Control

CWE-434

Unrestricted Upload of File with Dangerous Type