'; } else{ echo ''; } echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") { echo ''; echo 'hp-telecom'; } elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") { echo ''; echo 'Maipu'; } elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") { echo ''; echo 'Ncurity'; } elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") { echo ''; echo 'Socusnetwork'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

RULE(RULE ID:339625)

Rule General Information
Release Date: 2025-11-12
Rule Name: Tiandy Tianyu Network Security Audit System SQL Injection Vulnerability
Severity:
CVE ID:
Rule Protection Details
Description: The Tiandy Tianyu Network Security Audit System is designed for compliance logging and behavioral auditing of network traffic. Its reporting module exposes a web-accessible endpoint that accepts user-supplied input without adequate sanitization or parameterization. An unauthenticated attacker can embed arbitrary SQL syntax within requests to this endpoint, causing the backend database to execute injected statements. Exploitation grants unrestricted read access to the entire audit repository, user credentials, and system configurations; it also allows record tampering or deletion and can be chained with database privilege-escalation techniques to gain full control of the audit platform. Compromise of the audit trail eliminates the ability to reconstruct security incidents, breaks regulatory evidence chains, and exposes the organization to penalties, legal liability, and reputational damage.
Impact: An attacker can inject arbitrary sql commands to view or change the database of the target by exploiting the vulnerability successfully.
Affected OS: Windows, Linux, Others
Reference:
Solutions
Please contact the software vendor to update the software patch.