The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2020-27403

CVE-2020-27403: TCL Smart TV Information Disclosure Flaw

CVE-2020-27403 is an information disclosure vulnerability in TCL Android Smart TV firmware that exposes sensitive files via an insecure web server. This article covers technical details, affected versions, and mitigation strategies.

Published: March 4, 2026

CVE-2020-27403 Overview

CVE-2020-27403 is an information disclosure vulnerability affecting TCL Android Smart TV series manufactured by TCL Technology Group Corporation. The vulnerability exists in an insecure web server running on port 7989 that exposes a directory listing of all files and directories on the device. An attacker on the adjacent network can arbitrarily browse and download sensitive files from affected devices without authentication.

The vulnerability is particularly concerning because it allows unprivileged remote attackers to download critical system files, leading to serious information disclosure. Additionally, some TV models and firmware versions may expose the webserver on additional ports (such as port 7983 discovered on the U43P6046 model running Android 8.0) with the entire filesystem accessible. The webserver is also bound to the localhost interface, making it accessible to all unprivileged installed apps on the Android system, including regular web browsers. This means any malicious app can read files from other apps, including Android system settings, saved passwords, and private keys.

Critical Impact

Adjacent network attackers and local unprivileged apps can access sensitive system files including credentials, private keys, and configuration data from TCL Smart TVs.

Affected Products

  • TCL 32S330 and 32S330 Firmware
  • TCL 40S330 and 40S330 Firmware
  • TCL 43S434 and 43S434 Firmware
  • TCL 50S434 and 50S434 Firmware
  • TCL 55S434 and 55S434 Firmware
  • TCL 65S434 and 65S434 Firmware
  • TCL 75S434 and 75S434 Firmware
  • TCL V8-R851T02-LF1 V295 and below
  • TCL V8-T658T01-LF1 V373 and below

Discovery Timeline

  • 2020-11-10 - CVE-2020-27403 published to NVD
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2020-27403

Vulnerability Analysis

This vulnerability is classified as CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The affected TCL Android Smart TVs run an insecure web server that provides directory listing functionality without any authentication or access controls. The web server, accessible on port 7989 by default, presents a complete view of the device's file system to any user on the adjacent network.

The impact extends beyond simple network-based attacks. Since the webserver is bound to the localhost interface, any application installed on the TV—regardless of its privilege level—can access the entire filesystem through standard HTTP requests. This effectively bypasses Android's application sandboxing and permission model, allowing malicious apps to harvest sensitive data from other applications and system components.

Root Cause

The root cause of this vulnerability is the implementation of a web server service on TCL Android Smart TVs that lacks fundamental security controls. The server was deployed without authentication mechanisms, access control lists, or proper network binding restrictions. By exposing a directory listing of the entire filesystem and binding to interfaces accessible from both the local network and localhost, the design fundamentally violates the principle of least privilege and exposes sensitive system resources to unauthorized access.

Attack Vector

The attack can be executed from two vectors. First, an attacker positioned on the adjacent network (same Wi-Fi or local network segment) can directly connect to port 7989 (or port 7983 on some models) and browse the filesystem using any web browser or HTTP client. Second, a malicious Android application installed on the TV can make local HTTP requests to the webserver, extracting sensitive files without requiring any special permissions.

An attacker exploiting this vulnerability could retrieve system configuration files, stored credentials, private cryptographic keys, cached application data, and other sensitive information stored on the device. The attack requires no user interaction and can be automated for mass exploitation across vulnerable devices on the same network segment.

Detection Methods for CVE-2020-27403

Indicators of Compromise

  • Unexpected HTTP connections to ports 7989 or 7983 on TCL Smart TV devices
  • Network traffic showing directory listing requests or bulk file downloads from Smart TV IP addresses
  • Suspicious applications on the TV making localhost HTTP requests to the vulnerable ports
  • Log entries indicating external access to sensitive system files via the web server

Detection Strategies

  • Monitor network traffic for HTTP connections to unusual ports (7989, 7983) targeting Smart TV devices on the network
  • Implement network segmentation to isolate IoT devices and monitor cross-segment traffic for anomalies
  • Deploy intrusion detection rules to alert on directory traversal patterns or bulk file downloads from Smart TV devices
  • Conduct periodic network scans to identify exposed services on IoT devices within the enterprise environment

Monitoring Recommendations

  • Configure network monitoring tools to alert on any connections to known vulnerable ports on TCL Smart TV devices
  • Review Smart TV application installations for potentially malicious apps that could exploit local access
  • Implement logging at network boundaries to capture traffic patterns involving IoT devices
  • Periodically audit Smart TV firmware versions against known vulnerable versions

How to Mitigate CVE-2020-27403

Immediate Actions Required

  • Isolate affected TCL Smart TV devices on a separate network segment with restricted access
  • Block inbound connections to ports 7989 and 7983 on TCL Smart TVs using firewall rules
  • Audit installed applications on affected devices and remove any untrusted or unnecessary apps
  • Check for and apply any available firmware updates from TCL

Patch Information

TCL has acknowledged the vulnerability and provided guidance through their support portal. Users should consult the TCL Support Advisory on Vulnerabilities for the latest firmware updates and security patches. It is critical to update affected devices to the latest available firmware version that addresses this vulnerability.

For detailed technical information about the vulnerability, refer to the GitHub Security Advisory SICK-2020-009 and the Sick Codes Analysis on TCL Vulnerabilities.

Workarounds

  • Place TCL Smart TVs on an isolated IoT network segment without direct access to sensitive network resources
  • Implement firewall rules to block external access to ports 7989 and 7983 on Smart TV devices
  • Restrict application installations on the TV to only trusted sources and essential applications
  • Consider disabling network connectivity on affected TVs when not actively required for streaming services
bash
# Example firewall rule to block access to vulnerable ports (iptables)
iptables -A INPUT -p tcp --dport 7989 -j DROP
iptables -A INPUT -p tcp --dport 7983 -j DROP

# Example network segmentation using VLAN tagging
# Place IoT devices including Smart TVs on a dedicated VLAN
# Configure inter-VLAN routing to restrict access to sensitive resources

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechTcl

  • SeverityMEDIUM

  • CVSS Score6.5

  • EPSS Probability2.32%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-200
  • Technical References
  • GitHub User Repository

  • GitHub Security Advisory SICK-2020-009

  • GitHub CVE Global FAQ PDF

  • GitHub CVE Press Statement PDF

  • GitHub Issue Tracker Entry

  • Security Ledger Article on TCL TVs

  • Security Ledger TCL Back Door Update

  • Sick Codes Analysis on TCL Vulnerabilities

  • Sick Codes Advisory SICK-2020-009
  • Vendor Resources
  • TCL Support Advisory on Vulnerabilities
  • Related CVEs
  • CVE-2020-28055: TCL Smart TV Privilege Escalation Flaw
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English