Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3797: Unrestricted Upload in Tiandy Video Surveillance System 视频监控平台

0
Medium
VulnerabilityCVE-2026-3797cvecve-2026-3797
Published: Mon Mar 09 2026 (03/09/2026, 02:32:20 UTC)
Source: CVE Database V5
Vendor/Project: Tiandy
Product: Video Surveillance System 视频监控平台

Description

A security vulnerability has been detected in Tiandy Video Surveillance System 视频监控平台 7.17.0. The impacted element is the function uploadFile of the file /src/com/tiandy/easy7/core/rest/CLS_REST_File.java. The manipulation of the argument fileName leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/16/2026, 09:27:41 UTC

Technical Analysis

CVE-2026-3797 is a security vulnerability identified in Tiandy Video Surveillance System version 7.17.0, specifically within the uploadFile function located in the /src/com/tiandy/easy7/core/rest/CLS_REST_File.java source file. The vulnerability stems from insufficient validation or sanitization of the fileName argument, which allows an attacker to upload arbitrary files to the system without restrictions. This unrestricted upload flaw can be exploited remotely without requiring authentication or user interaction, significantly lowering the barrier for exploitation. The vulnerability has been publicly disclosed, and although no active exploits have been reported in the wild, the availability of exploit information increases the risk of future attacks. The vendor has been contacted but has not issued any response or patch, leaving affected systems exposed. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the network attack vector, low attack complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. Potential exploitation could allow attackers to upload malicious payloads such as web shells or malware, leading to remote code execution, unauthorized access, data leakage, or disruption of surveillance operations. Given the critical role of video surveillance systems in security monitoring, this vulnerability poses a significant risk to organizations relying on Tiandy products.

Potential Impact

The unrestricted file upload vulnerability in Tiandy Video Surveillance System can have serious consequences for organizations worldwide. Exploiting this flaw could enable attackers to upload malicious files, including web shells or ransomware, resulting in remote code execution and full system compromise. This jeopardizes the confidentiality of sensitive video footage and system credentials, the integrity of surveillance data, and the availability of monitoring services. Compromised surveillance systems could be used as pivot points for lateral movement within networks, increasing the risk of broader organizational breaches. Critical infrastructure, government facilities, and enterprises relying on Tiandy's surveillance solutions may face operational disruptions, data breaches, and reputational damage. The lack of vendor response and patches exacerbates the risk, as organizations remain exposed to potential exploitation. Although no active exploits are currently known, the public disclosure of the vulnerability details increases the likelihood of future attacks, especially from opportunistic or state-sponsored threat actors targeting surveillance infrastructure.

Mitigation Recommendations

To mitigate the risk posed by CVE-2026-3797, organizations should implement the following specific measures: 1) Immediately restrict network access to the Tiandy Video Surveillance System management interfaces, limiting exposure to trusted internal networks or VPNs. 2) Employ web application firewalls (WAFs) or intrusion prevention systems (IPS) with custom rules to detect and block suspicious file upload attempts targeting the vulnerable endpoint. 3) Conduct thorough monitoring and logging of file upload activities and system logs to detect anomalous behavior indicative of exploitation attempts. 4) If possible, apply manual input validation or filtering on the fileName parameter at the network perimeter or proxy level to prevent malicious payloads. 5) Isolate affected surveillance systems from critical network segments to contain potential breaches. 6) Engage with Tiandy or third-party security vendors for potential unofficial patches or workarounds until an official fix is released. 7) Regularly back up surveillance data and system configurations to enable recovery in case of compromise. 8) Educate security teams about this vulnerability and update incident response plans to include scenarios involving surveillance system compromise. These targeted actions go beyond generic advice and focus on compensating controls and proactive detection to reduce exploitation risk in the absence of an official patch.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-08T11:23:35.419Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ae3d052904315ca386c49b

Added to database: 3/9/2026, 3:22:45 AM

Last enriched: 3/16/2026, 9:27:41 AM

Last updated: 4/28/2026, 3:36:52 AM

Views: 106

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses