Brandon Rothel from QED Secure Solutions and Sam Hanson of Dragos have found that the VAPIX API tcptest.cgi did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. The impact of exploiting this vulnerability is lower with operator-privileges compared to administrator-privileges service accounts. Please refer to the Axis security advisory for more information and solution.
2024-02-05T06:15:46.690
2025-05-15T10:15:23.943
Modified
CVSSv3.1: 6.3 (MEDIUM)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | axis | m3024-lve_firmware | < 5.51.7.7 | Yes |
Hardware | axis | m3024-lve | - | No |
Operating System | axis | m3025-ve_firmware | < 5.51.7.7 | Yes |
Hardware | axis | m3025-ve | - | No |
Operating System | axis | m7014_firmware | < 5.51.7.7 | Yes |
Hardware | axis | m7014 | - | No |
Operating System | axis | m7016_firmware | < 5.51.7.7 | Yes |
Hardware | axis | m7016 | - | No |
Operating System | axis | p1214-e_firmware | < 5.51.7.7 | Yes |
Hardware | axis | p1214-e | - | No |
Operating System | axis | p7214_firmware | < 5.51.7.7 | Yes |
Hardware | axis | p7214 | - | No |
Operating System | axis | p7216_firmware | < 5.51.7.7 | Yes |
Hardware | axis | p7216 | - | No |
Operating System | axis | q7401_firmware | < 5.51.7.7 | Yes |
Hardware | axis | q7401 | - | No |
Operating System | axis | q7404_firmware | < 5.51.7.7 | Yes |
Hardware | axis | q7404 | - | No |
Operating System | axis | q7414_firmware | < 5.51.7.7 | Yes |
Hardware | axis | q7414 | - | No |
Operating System | axis | q7424-r_mk_ii_firmware | < 5.51.3.9 | Yes |
Hardware | axis | q7424-r_mk_ii | - | No |