CVE-2025-5695

MEDIUM

Flir Ax8 Firmware < 1.46.16 - Command Injection

Title source: rule
STIX 2.1

Description

A vulnerability has been found in Teledyne FLIR AX8 up to 1.46.16. This impacts the function subscribe_to_spot/subscribe_to_delta/subscribe_to_alarm of the file /usr/www/application/models/subscriptions.php of the component Backend. Such manipulation leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.49.16 will fix this issue. It is suggested to upgrade the affected component. The vendor points out: "FLIR AX8 internal web site has been refactored to be able to handle the reported vulnerabilities."

References (8)

Core 8
Core References
Third Party Advisory, VDB Entry vdb-entry technical-description
https://vuldb.com/?id.311211
Permissions Required, VDB Entry signature permissions-required
https://vuldb.com/?ctiid.311211
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.585715
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.584532
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.585716

Scores

CVSS v3 4.7
EPSS 0.0463
EPSS Percentile 89.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-74 CWE-77
Status published
Products (1)
flir/flir_ax8_firmware 1.46.0 - 1.46.16
Published Jun 05, 2025
Tracked Since Feb 18, 2026