Impact
The vulnerability resides in the UpdateLocalDevInfo.jsp endpoint of the Tiandy Easy7 Integrated Management Platform. Key detail from the CVE description: "Manipulation of the argument username/password leads to missing authentication." The flaw is characterized as an authentication bypass (CWE-287, CWE-306). As a result, an attacker can submit arbitrary credentials and be granted access through the endpoint without proper verification. The impact is that the attacker obtains access to the functionality provided by that page; the exact scope of that functionality is not defined in the CVE, but access to device identifiers and potential configuration information can be inferred as a risk.
Affected Systems
Affected systems are Tiandy Easy7 Integrated Management Platform version 7.17.0. Key detail from the CVE description: "Tiandy Easy7 Integrated Management Platform 7.17.0." No other versions are mentioned in the available data, so only systems running this specific version are known to be vulnerable.
Risk and Exploitability
The CVSS base score of 6.9 indicates a medium severity flaw. The EPSS score of less than 1% suggests a low likelihood of current exploitation, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is remote, and the exploit code is publicly available, which means threat actors can leverage the vulnerability without special restrictions. Because authentication is bypassed, an attacker could gain unauthorized access to the endpoint; from this position, the potential to read device information or alter configurations is inferred but not explicitly stated. Overall, the risk is moderate to high if the endpoint is exposed to external networks.
OpenCVE Enrichment