Certain Anpviz products allow unauthenticated users to download arbitrary files from the device's filesystem via a HTTP GET request to the /playback/ URI. This affects IPC-D250, IPC-D260, IPC-B850, IPC-D850, IPC-D350, IPC-D3150, IPC-D4250, IPC-D380, IPC-D880, IPC-D280, IPC-D3180, MC800N, YM500L, YM800N_N2, YMF50B, YM800SV2, YM500L8, and YM200E10 (IP Cameras) firmware v3.2.2.2 and lower and possibly more vendors/models of IP camera.
                
            Metrics
Affected Vendors & Products
References
        | Link | Providers | 
|---|---|
| https://willgu.es/pages/anpviz-ip-camera-vuln.html |     | 
History
                    Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | epss 
 | epss 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: mitre
Published: 2024-05-28T16:46:52.274Z
Updated: 2025-02-13T15:54:11.605Z
Reserved: 2024-05-17T00:00:00.000Z
Link: CVE-2024-35343
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-07-24T13:56:41.002Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2024-05-28T17:15:10.580
Modified: 2024-11-21T09:20:09.990
Link: CVE-2024-35343
 Redhat
                        Redhat
                    No data.
 ReportizFlow
ReportizFlow