Impact
The flaw is a server‑side request forgery vulnerability in the downloadImage function of CLSBODownLoad.java in Tiandy Video Surveillance System 7.17.0. An attacker can manipulate the urlPath argument to cause the server to send HTTP requests to arbitrary addresses. This allows external resources to be fetched, potentially exposing internal network information or enabling further malicious activity. The vulnerability is classified as CWE‑918 and enables remote exploitation.
Affected Systems
This issue affects Tiandy Video Surveillance System (video monitoring platform) version 7.17.0. No other versions or vendors were listed as affected.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate risk. The EPSS score is below 1%, suggesting a low probability of real‑world exploitation at present. The vulnerability is not listed in the CISA KEV catalog. The attack is remotely achievable by sending a crafted request to the downloadImage endpoint, where the attacker supplies a forged urlPath value. Successful exploitation would allow the server to reach arbitrary destinations, possibly exposing internal resources or executing further attack steps.
OpenCVE Enrichment