Search Results (103 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-11547 2 Axis, Axis Communications Ab 2 Camera Station Pro, Axis Camera Station Pro 2026-02-17 7.8 High
AXIS Camera Station Pro contained a flaw to perform a privilege escalation attack on the server as a non-admin user.
CVE-2025-12757 2 Axis, Axis Communications Ab 2 Camera Station Pro, Axis Camera Station Pro 2026-02-17 4.6 Medium
An AXIS Camera Station Pro feature can be exploited in a way that allows a non-admin user to view information they are not permitted to.
CVE-2025-13064 2 Axis, Axis Communications Ab 2 Camera Station Pro, Axis Camera Station Pro 2026-02-17 4.5 Medium
A server-side injection was possible for a malicious admin to manipulate the application to include a malicious script which is executed by the server. This attack is only possible if the admin uses a client that have been tampered with.
CVE-2025-12063 2 Axis, Axis Communications Ab 2 Camera Station Pro, Axis Camera Station Pro 2026-02-17 5.7 Medium
An insecure direct object reference allowed a non-admin user to modify or remove certain data objects without having the appropriate permissions.
CVE-2025-30025 1 Axis 2 Camera Station Pro, Device Manager 2026-01-23 7.8 High
The communication protocol used between the server process and the service control had a flaw that could lead to a local privilege escalation.
CVE-2025-30024 1 Axis 1 Device Manager 2026-01-23 6.8 Medium
The communication protocol used between client and server had a flaw that could be leveraged to execute a man in the middle attack.
CVE-2025-30023 1 Axis 3 Camera Station, Camera Station Pro, Device Manager 2026-01-23 9 Critical
The communication protocol used between client and server had a flaw that could lead to an authenticated user performing a remote code execution attack.
CVE-2025-0359 1 Axis 2 Axis Os, Axis Os 2024 2026-01-22 8.5 High
During an annual penetration test conducted on behalf of Axis Communication, Truesec discovered a flaw in the ACAP Application framework that allowed applications to access restricted D-Bus methods within the framework. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
CVE-2025-0360 1 Axis 2 Axis Os, Axis Os 2024 2026-01-22 7.8 High
During an annual penetration test conducted on behalf of Axis Communication, Truesec discovered a flaw in the VAPIX Device Configuration framework that could lead to an incorrect user privilege level in the VAPIX service account D-Bus API.
CVE-2024-8160 1 Axis 3 Axis Os, Axis Os 2022, Axis Os 2024 2026-01-22 3.8 Low
Erik de Jong, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API ftptest.cgi did not have a sufficient input validation allowing for a possible command injection leading to being able to transfer files from/to the Axis device. This flaw can only be exploited after authenticating with an administrator-privileged service account. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
CVE-2024-47259 1 Axis 2 Axis Os, Axis Os 2024 2026-01-22 3.5 Low
Girishunawane, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API dynamicoverlay.cgi did not have a sufficient input validation allowing for a possible command injection leading to being able to transfer files to the Axis device with the purpose to exhaust system resources. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
CVE-2025-6298 2 Axis, Axis Communications Ab 2 Axis Os, Axis Os 2026-01-21 6.7 Medium
ACAP applications can gain elevated privileges due to improper input validation, potentially leading to privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.
CVE-2025-30026 1 Axis 2 Camera Station, Camera Station Pro 2026-01-16 9.8 Critical
The AXIS Camera Station Server had a flaw that allowed to bypass authentication that is normally required.
CVE-2025-0324 1 Axis 2 Axis Os, Axis Os 2024 2026-01-15 9.4 Critical
The VAPIX Device Configuration framework allowed a privilege escalation, enabling a lower-privileged user to gain administrator privileges.
CVE-2025-0358 1 Axis 1 Axis Os 2026-01-15 8.8 High
During an annual penetration test conducted on behalf of Axis Communication, Truesec discovered a flaw in the VAPIX Device Configuration framework that allowed a privilege escalation, enabling a lower-privileged user to gain administrator privileges.
CVE-2025-0926 1 Axis 1 Camera Station Pro 2026-01-14 5.9 Medium
Gee-netics, member of AXIS Camera Station Pro Bug Bounty Program, has found that it is possible for a non-admin user to remove system files causing a boot loop by redirecting a file deletion when recording video. Axis has released a patched version for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
CVE-2025-1056 1 Axis 1 Camera Station Pro 2026-01-14 6.1 Medium
Gee-netics, member of AXIS Camera Station Pro Bug Bounty Program, has identified an issue with a specific file that the server is using. A non-admin user can modify this file to either create files or change the content of files in an admin-protected location. Axis has released a patched version for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
CVE-2024-6979 1 Axis 2 Axis Os, Axis Os 2024 2026-01-14 6.8 Medium
Amin Aliakbari, member of the AXIS OS Bug Bounty Program, has found a broken access control which would lead to less-privileged operator- and/or viewer accounts having more privileges than designed. The risk of exploitation is very low as it requires complex steps to execute, including knowing of account passwords and social engineering attacks in tricking the administrator to perform specific configurations on operator- and/or viewer-privileged accounts. Axis has released patched AXIS OS a version for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
CVE-2024-47261 1 Axis 3 Axis Os, Axis Os 2022, Axis Os 2024 2026-01-14 4.3 Medium
51l3nc3, a member of the AXIS OS Bug Bounty Program, has found that the VAPIX API uploadoverlayimage.cgi did not have sufficient input validation to allow an attacker to upload files to block access to create image overlays in the web interface of the Axis device.
CVE-2025-0361 1 Axis 2 Axis Os, Axis Os 2024 2026-01-14 4.3 Medium
During an annual penetration test conducted on behalf of Axis Communications, Truesec discovered a flaw in the VAPIX Device Configuration framework that allowed for unauthenticated username enumeration through the VAPIX Device Configuration SSH Management API.