Total vulnerabilities in the database
Brandon Rothel from QED Secure Solutions and Sam Hanson of Dragos have found that the VAPIX API tcptest.cgi did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. The impact of exploiting this vulnerability is lower with operator-privileges compared to administrator-privileges service accounts. Please refer to the Axis security advisory for more information and solution.
Software | From | Fixed in |
---|---|---|
axis / m3024-lve_firmware | - | 5.51.7.7 |
axis / m3025-ve_firmware | - | 5.51.7.7 |
axis / m7014_firmware | - | 5.51.7.7 |
axis / m7016_firmware | - | 5.51.7.7 |
axis / p1214-e_firmware | - | 5.51.7.7 |
axis / p7214_firmware | - | 5.51.7.7 |
axis / p7216_firmware | - | 5.51.7.7 |
axis / q7401_firmware | - | 5.51.7.7 |
axis / q7404_firmware | - | 5.51.7.7 |
axis / q7414_firmware | - | 5.51.7.7 |
axis / q7424-r_mk_ii_firmware | - | 5.51.3.9 |