Description
Erik de Jong, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API ftptest.cgi did not have a sufficient input validation allowing for a possible command injection leading to being able to transfer files from/to the Axis device. This flaw can only be exploited after authenticating with an administrator-privileged service account.
Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-49533 | Erik de Jong, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API ftptest.cgi did not have a sufficient input validation allowing for a possible command injection leading to being able to transfer files from/to the Axis device. This flaw can only be exploited after authenticating with an administrator-privileged service account. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution. |
References
History
Thu, 22 Jan 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Axis
Axis axis Os Axis axis Os 2022 Axis axis Os 2024 |
|
| CPEs | cpe:2.3:o:axis:axis_os:*:*:*:*:active:*:*:* cpe:2.3:o:axis:axis_os_2022:*:*:*:*:lts:*:*:* cpe:2.3:o:axis:axis_os_2024:*:*:*:*:lts:*:*:* |
|
| Vendors & Products |
Axis
Axis axis Os Axis axis Os 2022 Axis axis Os 2024 |
Tue, 26 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 26 Nov 2024 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Erik de Jong, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API ftptest.cgi did not have a sufficient input validation allowing for a possible command injection leading to being able to transfer files from/to the Axis device. This flaw can only be exploited after authenticating with an administrator-privileged service account. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution. | |
| Weaknesses | CWE-1286 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Axis
Published:
Updated: 2025-03-28T07:18:14.700Z
Reserved: 2024-08-26T06:30:37.790Z
Link: CVE-2024-8160
Updated: 2024-11-26T14:03:56.432Z
Status : Analyzed
Published: 2024-11-26T08:15:07.893
Modified: 2026-01-22T16:41:04.697
Link: CVE-2024-8160
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD