Vintage, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API create_overlay.cgi did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
axis axis os |
||
axis axis os 2022 |
||
axis axis os 2020 |