CVE-2026-3797

A security vulnerability has been detected in Tiandy Video Surveillance System 视频监控平台 7.17.0. The impacted element is the function uploadFile of the file /src/com/tiandy/easy7/core/rest/CLS_REST_File.java. The manipulation of the argument fileName leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://my.feishu.cn/docx/P3Bgdl9BHocn66xCMpCcgCD7nhe?from=from_copylink Permissions Required
https://vuldb.com/?ctiid.349764 Permissions Required VDB Entry
https://vuldb.com/?id.349764 Third Party Advisory VDB Entry
https://vuldb.com/?submit.766386 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tiandy:video_surveillance_system_firmware:7.17.0:*:*:*:*:*:*:*
cpe:2.3:h:tiandy:video_surveillance_system:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-09 04:16

Updated : 2026-03-10 18:48


NVD link : CVE-2026-3797

Mitre link : CVE-2026-3797

CVE.ORG link : CVE-2026-3797


JSON object : View

Products Affected

tiandy

  • video_surveillance_system_firmware
  • video_surveillance_system
CWE
CWE-284

Improper Access Control

CWE-434

Unrestricted Upload of File with Dangerous Type