Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-35291 | Certain Anpviz products allow unauthenticated users to download arbitrary files from the device's filesystem via a HTTP GET request to the /playback/ URI. This affects IPC-D250, IPC-D260, IPC-B850, IPC-D850, IPC-D350, IPC-D3150, IPC-D4250, IPC-D380, IPC-D880, IPC-D280, IPC-D3180, MC800N, YM500L, YM800N_N2, YMF50B, YM800SV2, YM500L8, and YM200E10 (IP Cameras) firmware v3.2.2.2 and lower and possibly more vendors/models of IP camera. |
| Link | Providers |
|---|---|
| https://willgu.es/pages/anpviz-ip-camera-vuln.html |
|
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Subscriptions
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-13T15:54:11.605Z
Reserved: 2024-05-17T00:00:00.000Z
Link: CVE-2024-35343
Updated: 2024-07-24T13:56:41.002Z
Status : Deferred
Published: 2024-05-28T17:15:10.580
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-35343
No data.
OpenCVE Enrichment
No data.
EUVD