Description
A vulnerability was found in Tiandy Easy7 Integrated Management Platform 7.17.0. This affects an unknown part of the file /rest/file/uploadLedImage of the component Endpoint. The manipulation of the argument File results in unrestricted upload. The attack may be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-16
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unrestricted Upload
Action: Patch Now
AI Analysis

Impact

The vulnerability exists in the Tiandy Easy7 Integrated Management Platform 7.17.0 and allows an attacker to upload files via the /rest/file/uploadLedImage endpoint without restriction. This unrestricted file upload (CWE‑434) also represents an improper access control issue (CWE‑284), giving the threat actor the ability to place arbitrary files on the device. If the server processes these files, the attacker could achieve remote code execution or elevate privileges, compromising confidentiality, integrity, and availability of the system.

Affected Systems

The flaw is specific to Tiandy Easy7 Integrated Management Platform version 7.17.0. No other versions or products are currently listed as affected in the CNA data. Users running this exact version should verify whether their deployment contains the /rest/file/uploadLedImage endpoint and assess exposure.

Risk and Exploitability

The CVSS base score is 6.9, indicating a moderate severity, while the EPSS score is below 1%, suggesting a low probability of current exploitation. The vulnerability is not listed in the CISA KEV catalog, implying no confirmed productive exploitation in the wild. However, the publicly available exploit means an attacker could target the remote HTTP endpoint, bypass input validation and upload arbitrary content, potentially leading to malicious code execution or denial of service. The risk is therefore moderate to high for environments where the endpoint is exposed to untrusted networks.

Generated by OpenCVE AI on March 17, 2026 at 11:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor patch or update to a fixed platform version as soon as it is released.
  • If a patch is not yet available, disable or restrict the /rest/file/uploadLedImage endpoint using firewall or web‑application‑firewall rules.
  • Ensure that file uploads are validated for type, size, and content, and configure the system to disallow executable files where possible.
  • Monitor audit logs for unexpected file upload activity and review stored files periodically for suspicious content.
  • Conduct a security review of exposed endpoints and adjust network segmentation to limit exposure of the management platform to trusted networks only.

Generated by OpenCVE AI on March 17, 2026 at 11:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Tiandy
Tiandy easy7 Integrated Management Platform
Vendors & Products Tiandy
Tiandy easy7 Integrated Management Platform

Mon, 16 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 07:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Tiandy Easy7 Integrated Management Platform 7.17.0. This affects an unknown part of the file /rest/file/uploadLedImage of the component Endpoint. The manipulation of the argument File results in unrestricted upload. The attack may be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Tiandy Easy7 Integrated Management Platform Endpoint uploadLedImage unrestricted upload
Weaknesses CWE-284
CWE-434
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tiandy Easy7 Integrated Management Platform
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-16T15:20:47.049Z

Reserved: 2026-03-15T16:30:51.586Z

Link: CVE-2026-4221

cve-icon Vulnrichment

Updated: 2026-03-16T15:20:43.485Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-16T14:20:13.947

Modified: 2026-03-16T14:53:07.390

Link: CVE-2026-4221

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:45:43Z

Weaknesses