Description
A weakness has been identified in Tiandy Easy7 Integrated Management Platform 7.17.0. The impacted element is an unknown function of the file /rest/devStatus/getDevDetailedInfo of the component Endpoint. Executing a manipulation of the argument ID can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-17
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Immediate Patch
AI Analysis

Impact

The vulnerability exists in the Tiandy Easy7 Integrated Management Platform (version 7.17.0) in an undocumented function of the endpoint /rest/devStatus/getDevDetailedInfo. Manipulating the ID argument allows an attacker to inject arbitrary SQL statements. The injected input can lead to unauthorized data disclosure, modification, or deletion, compromising both confidentiality and integrity of the system database.

Affected Systems

The affected system is Tiandy Easy7 Integrated Management Platform, specifically version 7.17.0 as identified by the vendor.

Risk and Exploitability

The CVSS Base score is 6.9, indicating a moderate severity. No EPSS data is available, and the vulnerability is not listed in the CISA KEV catalog. Exploit code is publicly available, and the attack can be performed remotely by sending a crafted request to the vulnerable endpoint. The lack of vendor response further elevates the risk, meaning any unpatched installations remain vulnerable and could be targeted by attackers.

Generated by OpenCVE AI on March 17, 2026 at 01:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check Tiandy website or vendor portal for a patch or newer version that addresses the SQL injection issue.
  • Apply the official patch or upgrade the Easy7 Integrated Management Platform to a version newer than 7.17.0.
  • Limit exposure of the /rest/devStatus/getDevDetailedInfo API by implementing firewall rules or access controls, reducing the attack surface.

Generated by OpenCVE AI on March 17, 2026 at 01:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 17 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Tiandy
Tiandy easy7 Integrated Management Platform
Vendors & Products Tiandy
Tiandy easy7 Integrated Management Platform

Tue, 17 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Tiandy Easy7 Integrated Management Platform 7.17.0. The impacted element is an unknown function of the file /rest/devStatus/getDevDetailedInfo of the component Endpoint. Executing a manipulation of the argument ID can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title Tiandy Easy7 Integrated Management Platform Endpoint getDevDetailedInfo sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tiandy Easy7 Integrated Management Platform
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-17T13:33:29.998Z

Reserved: 2026-03-16T16:31:32.134Z

Link: CVE-2026-4288

cve-icon Vulnrichment

Updated: 2026-03-17T13:33:24.702Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-17T00:16:19.700

Modified: 2026-03-17T14:20:01.670

Link: CVE-2026-4288

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:49:40Z

Weaknesses