Impact
The vulnerability resides in the uploadFile function of Tiandy Video Surveillance System 7.17.0, where the fileName argument is not properly validated, allowing arbitrary files to be uploaded from outside the device without authentication. The attack relies solely on file upload; while the CVE does not confirm execution of the payload, the ability to place files on the device could enable further malicious actions if the system processes uploaded content. This weakness corresponds to CWE-284 and CWE-434.
Affected Systems
Tiandy Video Surveillance System version 7.17.0 is affected. The vulnerability originates in the CLS_REST_File.java component. No other versions or firmware revisions are listed as impacted based on current CNA data.
Risk and Exploitability
With a CVSS score of 5.3 the risk is moderate, yet the EPSS score below 1% indicates a low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. The attack can be launched remotely from the network and does not require local privileges.
OpenCVE Enrichment