Certain Anpviz products allow unauthenticated users to download the running configuration of the device via a HTTP GET request to /ConfigFile.ini or /config.xml URIs. This configuration file contains usernames and encrypted passwords (encrypted with a hardcoded key common to all devices). This affects IPC-D250, IPC-D260, IPC-B850, IPC-D850, IPC-D350, IPC-D3150, IPC-D4250, IPC-D380, IPC-D880, IPC-D280, IPC-D3180, MC800N, YM500L, YM800N_N2, YMF50B, YM800SV2, YM500L8, and YM200E10 firmware v3.2.2.2 and lower and possibly more vendors/models of IP camera.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://willgu.es/pages/anpviz-ip-camera-vuln.html |
![]() ![]() |
History
Sat, 12 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-13T15:54:10.495Z
Reserved: 2024-05-17T00:00:00.000Z
Link: CVE-2024-35341

Updated: 2024-07-29T14:35:45.175Z

Status : Awaiting Analysis
Published: 2024-05-28T17:15:10.443
Modified: 2024-11-21T09:20:09.623
Link: CVE-2024-35341

No data.

No data.