Description
A vulnerability was identified in Tiandy Easy7 Integrated Management Platform 7.17.0. Impacted is an unknown function of the file /WebService/UpdateLocalDevInfo.jsp of the component Device Identifier Handler. Such manipulation of the argument username/password leads to missing authentication. The attack can be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-15
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass
Action: Apply Patch
AI Analysis

Impact

The vulnerability resides in the UpdateLocalDevInfo.jsp endpoint of the Tiandy Easy7 Integrated Management Platform. Key detail from the CVE description: "Manipulation of the argument username/password leads to missing authentication." The flaw is characterized as an authentication bypass (CWE-287, CWE-306). As a result, an attacker can submit arbitrary credentials and be granted access through the endpoint without proper verification. The impact is that the attacker obtains access to the functionality provided by that page; the exact scope of that functionality is not defined in the CVE, but access to device identifiers and potential configuration information can be inferred as a risk.

Affected Systems

Affected systems are Tiandy Easy7 Integrated Management Platform version 7.17.0. Key detail from the CVE description: "Tiandy Easy7 Integrated Management Platform 7.17.0." No other versions are mentioned in the available data, so only systems running this specific version are known to be vulnerable.

Risk and Exploitability

The CVSS base score of 6.9 indicates a medium severity flaw. The EPSS score of less than 1% suggests a low likelihood of current exploitation, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is remote, and the exploit code is publicly available, which means threat actors can leverage the vulnerability without special restrictions. Because authentication is bypassed, an attacker could gain unauthorized access to the endpoint; from this position, the potential to read device information or alter configurations is inferred but not explicitly stated. Overall, the risk is moderate to high if the endpoint is exposed to external networks.

Generated by OpenCVE AI on March 16, 2026 at 23:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify that your Tiandy Easy7 Integrated Management Platform is running version 7.17.0.
  • Apply any vendor‑released patch or update that addresses the authentication bypass if available.
  • If no patch exists, restrict access to the /WebService/UpdateLocalDevInfo.jsp endpoint using firewall rules or IP whitelisting.
  • Monitor system logs for unusual requests and regularly check Tiandy’s security advisories for further updates.

Generated by OpenCVE AI on March 16, 2026 at 23:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 16 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Tiandy
Tiandy easy7 Integrated Management Platform
Vendors & Products Tiandy
Tiandy easy7 Integrated Management Platform

Sun, 15 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Tiandy Easy7 Integrated Management Platform 7.17.0. Impacted is an unknown function of the file /WebService/UpdateLocalDevInfo.jsp of the component Device Identifier Handler. Such manipulation of the argument username/password leads to missing authentication. The attack can be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Tiandy Easy7 Integrated Management Platform Device Identifier UpdateLocalDevInfo.jsp missing authentication
Weaknesses CWE-287
CWE-306
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tiandy Easy7 Integrated Management Platform
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-16T20:14:36.584Z

Reserved: 2026-03-14T22:25:16.879Z

Link: CVE-2026-4187

cve-icon Vulnrichment

Updated: 2026-03-16T20:14:32.236Z

cve-icon NVD

Status : Deferred

Published: 2026-03-16T14:20:01.483

Modified: 2026-04-22T21:32:08.360

Link: CVE-2026-4187

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T14:01:16Z

Weaknesses