ID

VAR-201810-1635


CVE

CVE-2018-25139


TITLE

FLIR Systems FLIR AX8 Thermal Camera 1.32.16 RTSP Stream Disclosure

Trust: 0.1

sources: ZSL: ZSL-2018-5492

DESCRIPTION

FLIR AX8 Thermal Camera 1.32.16 contains an unauthenticated vulnerability that allows remote attackers to access live video streams without credentials. Attackers can directly connect to the RTSP stream using tools like VLC or FFmpeg to view and record thermal camera footage. Thermal Imaging Camera For Continuous Condition and Safety Monitoring FLIR AX8 is a thermal sensor with imaging capabilities. Combining thermal and visual cameras in a small, affordable package, the AX8 provides continuous temperature monitoring and alarming capabilities to protec critical electrical and mechanical equipment. The AX8 helps you guard against unplanned outages, service interruptions, and equipment failure.<br/><br/> The FLIR AX series camera/sensor also has built-in support to connect to industrial control equipment such as programmable logic controllers (PLCs), and allows the sharing of analysis and alarm results and simple control using the Ethernet/IP and Modbus TCP field bus protocols. Compact and easy to install, the AX8 provides continuous monitoring of electrical cabinets, process and manufacturing areas, data centers, energy generation and distribution, transportation and mass transit, storage facilities and refrigeration warehouses.The FLIR AX8 thermal sensor camera suffers an unauthenticated and unauthorized live RTSP video stream access.Tested on: GNU/Linux 3.0.35-flir+gfd883a0 (armv7l)lighttpd/1.4.33PHP/5.4.14

Trust: 0.99

sources: NVD: CVE-2018-25139 // ZSL: ZSL-2018-5492

AFFECTED PRODUCTS

vendor:flirmodel:ax8scope:eqversion:1.32.16

Trust: 1.0

vendor:flirmodel:ax8scope:eqversion:1.17.13

Trust: 1.0

vendor:flirmodel:systems flir ax8 thermal camerascope:eqversion:1.17.13

Trust: 0.1

vendor:flirmodel:systems flir ax8 thermal camerascope:eqversion:os: neco_v1.8-0-g7ffe5b3

Trust: 0.1

vendor:flirmodel:systems flir ax8 thermal camerascope:eqversion:hardware: flir systems neco board

Trust: 0.1

sources: ZSL: ZSL-2018-5492 // NVD: CVE-2018-25139

CVSS

SEVERITY

CVSSV2

CVSSV3

disclosure@vulncheck.com: CVE-2018-25139
value: HIGH

Trust: 1.0

ZSL: ZSL-2018-5492
value: (3/5)

Trust: 0.1

disclosure@vulncheck.com: CVE-2018-25139
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

sources: ZSL: ZSL-2018-5492 // NVD: CVE-2018-25139

PROBLEMTYPE DATA

problemtype:CWE-306

Trust: 1.0

sources: NVD: CVE-2018-25139

TYPE

Local/Remote,Exposure of System Information, Exposure of Sensitive Information

Trust: 0.1

sources: ZSL: ZSL-2018-5492

EXPLOIT AVAILABILITY

sources: ZSL: ZSL-2018-5492

EXTERNAL IDS

db:EXPLOIT-DBid:45606

Trust: 1.1

db:ZSLid:ZSL-2018-5492

Trust: 1.1

db:NVDid:CVE-2018-25139

Trust: 1.0

db:PACKETSTORMid:149797

Trust: 0.1

sources: ZSL: ZSL-2018-5492 // NVD: CVE-2018-25139

REFERENCES

url:https://www.exploit-db.com/exploits/45606

Trust: 1.0

url:https://www.flir.com

Trust: 1.0

url:https://www.zeroscience.mk/en/vulnerabilities/zsl-2018-5492.php

Trust: 1.0

url:https://www.flir.com/security/best-practices-for-cybersecurity/

Trust: 0.1

url:https://www.flir.com/globalassets/security/flir-pro-security-cyber-hardening-guide.pdf

Trust: 0.1

url:https://www.flir.com/globalassets/security/cybersecurity-bulletin-10-12-18.pdf

Trust: 0.1

url:https://www.exploit-db.com/exploits/45606/

Trust: 0.1

url:https://packetstormsecurity.com/files/149797

Trust: 0.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/151283

Trust: 0.1

sources: ZSL: ZSL-2018-5492 // NVD: CVE-2018-25139

CREDITS

Vulnerability discovered by Gjoko Krstic

Trust: 0.1

sources: ZSL: ZSL-2018-5492

SOURCES

db:ZSLid:ZSL-2018-5492
db:NVDid:CVE-2018-25139

LAST UPDATE DATE

2026-01-15T23:26:55.766000+00:00


SOURCES UPDATE DATE

db:ZSLid:ZSL-2018-5492date:2018-10-17T00:00:00
db:NVDid:CVE-2018-25139date:2025-12-31T18:40:36.483

SOURCES RELEASE DATE

db:ZSLid:ZSL-2018-5492date:2018-10-14T00:00:00
db:NVDid:CVE-2018-25139date:2025-12-24T20:15:47.957