Home Anpviz CVE-2024-35343
Back to Anpviz

CVE-2024-35343

Anpviz IP Cameras - Web Server

Anpviz CVSS 9.8 Updated April 6, 2026

Executive Risk Summary

"A vulnerability in Anpviz IP Cameras allows unauthenticated users to download arbitrary files from the device's filesystem via a HTTP GET request to the /playback/ URI. This affects multiple Anpviz IP camera models with firmware v3.2.2.2 and lower."

Anticipated Attack Path

  1. 1. Send a crafted HTTP GET request to the /playback/ URI
  2. 2. Download arbitrary files from the device's filesystem
  3. 3. Exploit sensitive information for further attacks

Am I Vulnerable?

  • Verify the firmware version of Anpviz IP cameras
  • Check for any suspicious HTTP GET requests to the /playback/ URI
  • Monitor for unauthorized file downloads

Operational Audit Arsenal

Target Type Web Server
Target Asset httpd
Standard Path /playback/

Manual Verification Required

This is a non-Windows asset (Anpviz). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Likely

Temporary loss of camera functionality during firmware update

Internal Work Notes

Unauthenticated file download vulnerability in Anpviz IP cameras, requiring firmware update to prevent sensitive information exposure.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Anpviz Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.