{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T20:56:33.162","vulnerabilities":[{"cve":{"id":"CVE-2024-6248","sourceIdentifier":"zdi-disclosures@trendmicro.com","published":"2024-11-22T20:15:11.783","lastModified":"2025-08-08T15:07:16.410","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Wyze Cam v3 Cloud Infrastructure Improper Authentication Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Wyze Cam v3 IP cameras. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the run_action_batch endpoint of the cloud infrastructure. The issue results from the use of the device's MAC address as a sole credential for authentication. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-22393."},{"lang":"es","value":"Vulnerabilidad de ejecución remota de código mediante autenticación incorrecta en la infraestructura en la nube de Wyze Cam v3. Esta vulnerabilidad permite a los atacantes adyacentes a la red ejecutar código arbitrario en las instalaciones afectadas de las cámaras IP Wyze Cam v3. No se requiere autenticación para explotar esta vulnerabilidad. La falla específica existe dentro del endpoint run_action_batch de la infraestructura en la nube. El problema es el resultado del uso de la dirección MAC del dispositivo como única credencial para la autenticación. Un atacante puede aprovechar esto junto con otras vulnerabilidades para ejecutar código arbitrario en el contexto de la raíz. Era ZDI-CAN-22393."}],"metrics":{"cvssMetricV30":[{"source":"zdi-disclosures@trendmicro.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.6,"impactScore":5.9}]},"weaknesses":[{"source":"zdi-disclosures@trendmicro.com","type":"Secondary","description":[{"lang":"en","value":"CWE-287"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:wyze:cam_v3_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"4.36.11.8391","matchCriteriaId":"1F3FF9A5-721F-4735-B240-F52A42AD84F1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:wyze:cam_v3:-:*:*:*:*:*:*:*","matchCriteriaId":"C96BD4E4-F38A-4D78-851D-0F879B4D3A16"}]}]}],"references":[{"url":"https://forums.wyze.com/t/security-advisory/289256","source":"zdi-disclosures@trendmicro.com","tags":["Vendor Advisory"]},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-24-839/","source":"zdi-disclosures@trendmicro.com","tags":["Third Party Advisory"]}]}}]}