Beward N100 H.264 VGA IP Camera M2.1.6 contains an authenticated file disclosure vulnerability that allows attackers to read arbitrary system files via the 'READ.filePath' parameter. Attackers can exploit the fileread script or SendCGICMD API to access sensitive files like /etc/passwd and /etc/issue by supplying absolute file paths.
PUBLISHED5.2CWE-22
Beward N100 H.264 VGA IP Camera M2.1.6 Authenticated File Disclosure
Problem type
Affected products
Beward R&D Co., Ltd
N100 H.264 VGA IP Camera
M2.1.6.04C014 - AFFECTED
References
ExploitDB-46320
https://www.exploit-db.com/exploits/46320
Beward Product Homepage
https://www.beward.net
Zero Science Lab Disclosure (ZSL-2019-5511)
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5511.php
GitHub Security Advisories
GHSA-mfqx-6pfv-xp5p
Beward N100 H.264 VGA IP Camera M2.1.6 contains an authenticated file disclosure vulnerability...
https://github.com/advisories/GHSA-mfqx-6pfv-xp5pBeward N100 H.264 VGA IP Camera M2.1.6 contains an authenticated file disclosure vulnerability that allows attackers to read arbitrary system files via the 'READ.filePath' parameter. Attackers can exploit the fileread script or SendCGICMD API to access sensitive files like /etc/passwd and /etc/issue by supplying absolute file paths.
JSON source
https://cveawg.mitre.org/api/cve/CVE-2019-25246Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2019-25246",
"assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"assignerShortName": "VulnCheck",
"dateUpdated": "2025-12-24T20:22:45.916Z",
"dateReserved": "2025-12-24T14:27:12.477Z",
"datePublished": "2025-12-24T19:28:00.474Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"shortName": "VulnCheck",
"dateUpdated": "2025-12-24T19:28:00.474Z"
},
"datePublic": "2019-01-26T00:00:00.000Z",
"title": "Beward N100 H.264 VGA IP Camera M2.1.6 Authenticated File Disclosure",
"descriptions": [
{
"lang": "en",
"value": "Beward N100 H.264 VGA IP Camera M2.1.6 contains an authenticated file disclosure vulnerability that allows attackers to read arbitrary system files via the 'READ.filePath' parameter. Attackers can exploit the fileread script or SendCGICMD API to access sensitive files like /etc/passwd and /etc/issue by supplying absolute file paths."
}
],
"affected": [
{
"vendor": "Beward R&D Co., Ltd",
"product": "N100 H.264 VGA IP Camera",
"versions": [
{
"version": "M2.1.6.04C014",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
"cweId": "CWE-22",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://www.exploit-db.com/exploits/46320",
"name": "ExploitDB-46320",
"tags": [
"exploit"
]
},
{
"url": "https://www.beward.net",
"name": "Beward Product Homepage",
"tags": [
"product"
]
},
{
"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5511.php",
"name": "Zero Science Lab Disclosure (ZSL-2019-5511)",
"tags": [
"third-party-advisory"
]
}
],
"metrics": [
{
"format": "CVSS"
},
{
"format": "CVSS",
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
}
}
],
"credits": [
{
"lang": "en",
"value": "LiquidWorm as Gjoko Krstic of Zero Science Lab",
"type": "finder"
}
]
},
"adp": [
{
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2025-12-24T20:22:45.916Z"
},
"title": "CISA ADP Vulnrichment",
"references": [
{
"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5511.php",
"tags": [
"exploit"
]
}
],
"metrics": [
{}
]
}
]
}
}