Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4288: SQL Injection in Tiandy Easy7 Integrated Management Platform

0
Medium
VulnerabilityCVE-2026-4288cvecve-2026-4288
Published: Tue Mar 17 2026 (03/17/2026, 00:02:39 UTC)
Source: CVE Database V5
Vendor/Project: Tiandy
Product: Easy7 Integrated Management Platform

Description

CVE-2026-4288 is a SQL injection vulnerability in Tiandy Easy7 Integrated Management Platform version 7. 17. 0, specifically in the /rest/devStatus/getDevDetailedInfo endpoint. An attacker can remotely manipulate the ID parameter to execute arbitrary SQL commands without authentication or user interaction. The vulnerability has a CVSS 4. 0 score of 6. 9, indicating medium severity, with potential impacts on confidentiality, integrity, and availability of the affected system. Although no known exploits are currently observed in the wild, a public exploit is available, increasing the risk of exploitation. The vendor has not responded to disclosure attempts, and no patches are currently available. Organizations using this platform should prioritize mitigation to prevent unauthorized data access or system compromise.

AI-Powered Analysis

AILast updated: 03/17/2026, 18:29:11 UTC

Technical Analysis

CVE-2026-4288 identifies a SQL injection vulnerability in the Tiandy Easy7 Integrated Management Platform version 7.17.0. The flaw exists in the /rest/devStatus/getDevDetailedInfo REST API endpoint, where the ID parameter is improperly sanitized, allowing an attacker to inject malicious SQL queries. This vulnerability can be exploited remotely without any authentication or user interaction, making it highly accessible to attackers. The SQL injection can lead to unauthorized data retrieval, modification, or deletion within the backend database, potentially compromising the confidentiality, integrity, and availability of the system. The vulnerability has been publicly disclosed with an exploit available, although no active exploitation in the wild has been reported yet. The vendor was notified but has not issued any patch or mitigation guidance, leaving users exposed. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) reflects a network attack vector with low attack complexity, no privileges or user interaction required, and partial impact on confidentiality, integrity, and availability. The lack of vendor response and patch availability increases the urgency for organizations to implement compensating controls. Tiandy’s Easy7 platform is used primarily in video surveillance and integrated management systems, which are critical infrastructure components in many organizations, amplifying the potential impact of exploitation.

Potential Impact

The SQL injection vulnerability in Tiandy Easy7 Integrated Management Platform can lead to unauthorized access to sensitive data, including potentially user credentials, configuration details, and surveillance data. Attackers could manipulate or delete data, disrupt system operations, or pivot to other internal systems. Given the platform’s role in integrated management and surveillance, exploitation could compromise physical security monitoring and control systems, leading to broader organizational risk. The remote, unauthenticated nature of the exploit increases the likelihood of attacks, especially since a public exploit is available. Organizations relying on this platform may face data breaches, operational disruptions, and reputational damage. The absence of vendor patches means that the vulnerability remains unmitigated at the software level, increasing exposure. The impact is particularly significant for sectors relying on Tiandy’s solutions for security and operational management, including government, critical infrastructure, and large enterprises.

Mitigation Recommendations

Since no official patch is available, organizations should implement immediate compensating controls. First, restrict network access to the affected endpoint (/rest/devStatus/getDevDetailedInfo) by applying firewall rules or network segmentation to limit exposure to trusted IP addresses only. Second, deploy web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the ID parameter. Third, conduct thorough input validation and sanitization at the application or proxy level if possible. Fourth, monitor logs and network traffic for unusual queries or access patterns to this endpoint to detect potential exploitation attempts early. Fifth, consider isolating or disabling the vulnerable service if it is not critical to operations. Finally, maintain close monitoring of vendor communications for any future patches or advisories and plan for timely updates once available. Organizations should also review and harden database permissions to minimize damage in case of exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-16T16:31:32.134Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b99a3b771bdb1749cb0cb3

Added to database: 3/17/2026, 6:15:23 PM

Last enriched: 3/17/2026, 6:29:11 PM

Last updated: 3/17/2026, 11:08:14 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses