ID

VAR-202505-2061


CVE

CVE-2025-5126


TITLE

FLIR Systems, Inc.  of  flir ax8  Command injection vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-007151

DESCRIPTION

A vulnerability was found in Teledyne FLIR AX8 up to 1.46.16. This vulnerability affects the function setDataTime of the file \usr\www\application\models\settingsregional.php. Performing manipulation of the argument year/month/day/hour/minute results in command injection. The attack may be initiated remotely. The exploit has been made public and could be used. Upgrading to version 1.49.16 is able to resolve this issue. Upgrading the affected component is recommended. The vendor points out: "FLIR AX8 internal web site has been refactored to be able to handle the reported vulnerabilities.". FLIR Systems, Inc. of flir ax8 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.62

sources: NVD: CVE-2025-5126 // JVNDB: JVNDB-2025-007151

AFFECTED PRODUCTS

vendor:flirmodel:ax8scope:lteversion:1.46.16

Trust: 1.0

vendor:flirmodel:ax8scope:gteversion:1.46.0

Trust: 1.0

vendor:flirmodel:ax8scope:eqversion:flir ax8 firmware 1.46.0 to 1.46.16

Trust: 0.8

vendor:flirmodel:ax8scope: - version: -

Trust: 0.8

vendor:flirmodel:ax8scope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2025-007151 // NVD: CVE-2025-5126

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-5126
value: HIGH

Trust: 1.0

OTHER: JVNDB-2025-007151
value: HIGH

Trust: 0.8

cna@vuldb.com: CVE-2025-5126
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2025-007151
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

cna@vuldb.com: CVE-2025-5126
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

OTHER: JVNDB-2025-007151
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2025-007151 // NVD: CVE-2025-5126

PROBLEMTYPE DATA

problemtype:CWE-74

Trust: 1.0

problemtype:CWE-77

Trust: 1.0

problemtype:injection (CWE-74) [ others ]

Trust: 0.8

problemtype: Command injection (CWE-77) [NVD evaluation ]

Trust: 0.8

problemtype: Command injection (CWE-77) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-007151 // NVD: CVE-2025-5126

EXTERNAL IDS

db:NVDid:CVE-2025-5126

Trust: 2.6

db:VULDBid:310204

Trust: 1.8

db:JVNDBid:JVNDB-2025-007151

Trust: 0.8

sources: JVNDB: JVNDB-2025-007151 // NVD: CVE-2025-5126

REFERENCES

url:https://github.com/yzs17/cve/blob/main/remote%20command%20injection%20in%20parameter%20%24hour.md

Trust: 1.8

url:https://github.com/yzs17/cve/blob/main/remote%20command%20injection%20in%20parameter%20%24minute.md

Trust: 1.8

url:https://vuldb.com/?id.310204

Trust: 1.8

url:https://vuldb.com/?submit.570725

Trust: 1.8

url:https://vuldb.com/?submit.572277

Trust: 1.0

url:https://vuldb.com/?ctiid.310204

Trust: 1.0

url:https://vuldb.com/?submit.572266

Trust: 1.0

url:https://vuldb.com/?submit.572275

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2025-5126

Trust: 0.8

sources: JVNDB: JVNDB-2025-007151 // NVD: CVE-2025-5126

SOURCES

db:JVNDBid:JVNDB-2025-007151
db:NVDid:CVE-2025-5126

LAST UPDATE DATE

2025-10-15T23:52:47.694000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2025-007151date:2025-06-17T04:41:00
db:NVDid:CVE-2025-5126date:2025-10-15T14:15:55.317

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2025-007151date:2025-06-17T00:00:00
db:NVDid:CVE-2025-5126date:2025-05-24T15:15:24.160