Brandon Rothel from QED Secure Solutions has found that the VAPIX API tcptest.cgi did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. The impact of exploiting this vulnerability is lower with operator-privileges compared to administrator-privileges service accounts. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
axis m3024-lve_firmware |
||
axis m3025-ve_firmware |
||
axis m7014_firmware |
||
axis m7016_firmware |
||
axis p1214-e_firmware |
||
axis p7214_firmware |
||
axis p7216_firmware |
||
axis q7401_firmware |
||
axis q7404_firmware |
||
axis q7414_firmware |
||
axis q7424-r_mk_ii_firmware |