Description
A vulnerability has been found in Teledyne FLIR AX8 up to 1.46.16. This impacts the function subscribe_to_spot/subscribe_to_delta/subscribe_to_alarm of the file /usr/www/application/models/subscriptions.php of the component Backend. Such manipulation leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.49.16 will fix this issue. It is suggested to upgrade the affected component. The vendor points out: "FLIR AX8 internal web site has been refactored to be able to handle the reported vulnerabilities."
References (8)
Core 8
Core References
Third Party Advisory, VDB Entry vdb-entry
technical-description
https://vuldb.com/?id.311211
Permissions Required, VDB Entry signature
permissions-required
https://vuldb.com/?ctiid.311211
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.585715
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.584532
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.585716
Exploit broken-link
https://github.com/YZS17/CVE/blob/main/Command%20injection%20vulnerability%20in%20subscribe_to_spot()%20in%20FLIR%20AX8.md
Exploit broken-link
exploit
https://github.com/YZS17/CVE/blob/main/Command%20injection%20vulnerability%20in%20subscribe_to_delta()%20in%20FLIR%20AX8.md
Permissions Required patch
https://flir.custhelp.com/app/account/fl_download_software
Scores
CVSS v3
4.7
EPSS
0.0463
EPSS Percentile
89.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-74
CWE-77
Status
published
Products (1)
flir/flir_ax8_firmware
1.46.0 - 1.46.16
Published
Jun 05, 2025
Tracked Since
Feb 18, 2026