The VAPIX API port.cgi did not have sufficient input validation, which may result in process crashes and impact usability. This vulnerability can only be exploited after authenticating with a viewer- operator- or administrator-privileged service account.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 11 Nov 2025 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The VAPIX API port.cgi did not have sufficient input validation, which may result in process crashes and impact usability. This vulnerability can only be exploited after authenticating with a viewer- operator- or administrator-privileged service account. | |
| Weaknesses | CWE-1287 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Axis
Published:
Updated: 2025-11-11T07:33:54.758Z
Reserved: 2025-08-27T05:23:55.357Z
Link: CVE-2025-9524
No data.
Status : Received
Published: 2025-11-11T08:15:35.213
Modified: 2025-11-11T08:15:35.213
Link: CVE-2025-9524
No data.
OpenCVE Enrichment
No data.