POC详情: a9a2b05aad28b567a028e89803e932862c5ad6d2

来源
关联漏洞
标题: TCL 65C655 Smart TV 安全漏洞 (CVE-2025-55971)
描述:TCL 65C655 Smart TV是中国TCL公司的一款智能电视。 TCL 65C655 Smart TV V8-R75PT01-LF1V269.001116版本存在安全漏洞,该漏洞源于UPnP MediaRenderer服务接受未经验证的SetAVTransportURI SOAP请求,可能导致服务端请求伪造攻击。
描述
TCL 65C655 Smart TV, running firmware version V8-R75PT01-LF1V269.001116 (Android TV, Kernel 5.4.242+), is vulnerable to a blind, unauthenticated Server-Side Request Forgery (SSRF) via the UPnP MediaRenderer service (AVTransport).
介绍
# CVE-2025-55971-Blind-Unauthenticated-SSRF-in-TCL-Smart-TV-UPnP-DLNA-AVTransport
TCL 65C655 Smart TV, running firmware version V8-R75PT01-LF1V269.001116 (Android TV, Kernel 5.4.242+), is vulnerable to a blind, unauthenticated Server-Side Request Forgery (SSRF) via the UPnP MediaRenderer service (AVTransport).

### Vendor: 
TCL Technology Group Corporation

### Product: 
TCL Smart TV (tested: 65C655)

### Vulnerability type: 
Unauthenticated blind Server-Side Request Forgery (SSRF) in UPnP/DLNA MediaRenderer (AVTransport)

### Impact: 
Device may issue outbound HTTP requests to attacker-controlled destinations on the local network or the Internet (blind SSRF).

### CVSS v3.1 (Base): 
4.6 (AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L)

### Discovery date: 
2025-06-28

### CVE: 
CVE-2025-55971

## Description: 
TCL 65C655 Smart TV, running firmware version V8-R75PT01-LF1V269.001116 (Android TV, Kernel 5.4.242+), is vulnerable to a blind, unauthenticated Server-Side Request Forgery (SSRF) via the UPnP MediaRenderer service (AVTransport:1). The device accepts unauthenticated SetAVTransportURI SOAP requests over TCP/16XXX and attempts to retrieve externally referenced URIs, including attacker-controlled payloads. The blind SSRF allows an attacker to force the TV to send requests on its behalf to internal (e.g., 127.0.0.1:16XXX, LAN services) or internet targets, which may be leveraged in further exploit chains. Supported URIs include .jpg, .png, .mp3, .mp4, .gif, and other standard media formats. Affected port changes across restarts but remains within the 16XXX range.
文件快照

[4.0K] /data/pocs/a9a2b05aad28b567a028e89803e932862c5ad6d2 └── [1.5K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。