Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4289: SQL Injection in Tiandy Easy7 Integrated Management Platform

0
Medium
VulnerabilityCVE-2026-4289cvecve-2026-4289
Published: Tue Mar 17 2026 (03/17/2026, 00:03:10 UTC)
Source: CVE Database V5
Vendor/Project: Tiandy
Product: Easy7 Integrated Management Platform

Description

CVE-2026-4289 is a medium-severity SQL injection vulnerability affecting Tiandy Easy7 Integrated Management Platform versions up to 7. 17. 0. The flaw exists in the /rest/preSetTemplate/getRecByTemplateId endpoint, where manipulation of the ID parameter allows an unauthenticated remote attacker to execute arbitrary SQL commands. This vulnerability does not require user interaction or privileges and can lead to partial compromise of confidentiality, integrity, and availability of the affected system's database. Although no public exploits are currently observed in the wild, the exploit code has been publicly disclosed. The vendor has not responded to early notifications, and no patches are available yet. Organizations using this platform should prioritize mitigation to prevent potential data breaches or system disruption. Countries with significant deployment of Tiandy products, especially in Asia and regions with critical infrastructure using this platform, are at higher risk.

AI-Powered Analysis

AILast updated: 03/17/2026, 18:28:55 UTC

Technical Analysis

CVE-2026-4289 is a SQL injection vulnerability identified in the Tiandy Easy7 Integrated Management Platform, specifically affecting versions from 7.0 through 7.17.0. The vulnerability resides in the REST API endpoint /rest/preSetTemplate/getRecByTemplateId, where the ID parameter is improperly sanitized, allowing an attacker to inject malicious SQL queries. This injection flaw can be exploited remotely without authentication or user interaction, making it highly accessible to attackers. The vulnerability impacts the confidentiality, integrity, and availability of the backend database by enabling unauthorized data access, modification, or deletion. The CVSS 4.0 base score is 6.9, reflecting medium severity due to the ease of exploitation and potential impact, but limited scope of data exposure. The vendor was notified but has not issued any patches or advisories, and no known exploits have been observed in the wild yet, though public exploit code exists. This lack of vendor response increases the risk for organizations relying on this platform. The vulnerability is critical for environments where the Easy7 platform manages sensitive or operational data, such as video surveillance or integrated management systems. Attackers could leverage this flaw to extract sensitive information, disrupt services, or pivot within the network.

Potential Impact

The SQL injection vulnerability allows remote attackers to execute arbitrary SQL commands on the backend database without authentication, potentially leading to unauthorized data disclosure, data manipulation, or deletion. This can compromise the confidentiality of sensitive information managed by the Easy7 platform, such as surveillance data or configuration details. Integrity of the system can be undermined by unauthorized changes to database records, potentially affecting system operations or decision-making processes. Availability may also be impacted if attackers execute destructive queries or cause database errors, leading to service disruption. Organizations using this platform in critical infrastructure, security monitoring, or enterprise environments face risks of data breaches, operational downtime, and reputational damage. The absence of vendor patches and public exploit disclosure increases the likelihood of exploitation attempts, especially by opportunistic attackers scanning for vulnerable instances.

Mitigation Recommendations

Organizations should immediately audit their deployments of Tiandy Easy7 Integrated Management Platform to identify affected versions (7.0 through 7.17.0). Until an official patch is released, implement the following mitigations: 1) Restrict network access to the /rest/preSetTemplate/getRecByTemplateId endpoint using firewall rules or web application firewalls (WAF) to limit exposure to trusted IPs only. 2) Employ input validation and sanitization at the application or proxy level to block suspicious or malformed ID parameter values. 3) Monitor logs for unusual or repeated requests targeting this endpoint to detect exploitation attempts early. 4) If possible, isolate the Easy7 platform in a segmented network zone with minimal access to sensitive backend systems. 5) Regularly back up databases and configuration data to enable recovery if compromise occurs. 6) Engage with Tiandy support channels for updates and patches, and consider alternative solutions if vendor responsiveness remains absent. 7) Conduct penetration testing focused on SQL injection vectors to identify other potential injection points. These measures reduce attack surface and improve detection until a vendor patch is available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-16T16:31:56.591Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b99a3b771bdb1749cb0cbc

Added to database: 3/17/2026, 6:15:23 PM

Last enriched: 3/17/2026, 6:28:55 PM

Last updated: 3/17/2026, 11:22:32 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses