Show filters
11 Total Results
Displaying 1-10 of 11
Sort by:
Attacker Value
Very High
CVE-2022-37061
Disclosure Date: August 18, 2022 (last updated November 29, 2024)
All FLIR AX8 thermal sensor cameras version up to and including 1.46.16 are vulnerable to Remote Command Injection. This can be exploited to inject and execute arbitrary shell commands as the root user through the id HTTP POST parameter in the res.php endpoint. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the root privileges.
1
Attacker Value
Unknown
CVE-2024-3013
Disclosure Date: March 28, 2024 (last updated April 11, 2024)
A vulnerability was found in FLIR AX8 up to 1.46.16. It has been rated as critical. This issue affects some unknown processing of the file /tools/test_login.php?action=register of the component User Registration. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258299. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
0
Attacker Value
Unknown
CVE-2023-51127
Disclosure Date: January 10, 2024 (last updated January 18, 2024)
FLIR AX8 thermal sensor cameras up to and including 1.46.16 are vulnerable to Directory Traversal due to improper access restriction. This vulnerability allows an unauthenticated, remote attacker to obtain arbitrary sensitive file contents by uploading a specially crafted symbolic link file.
0
Attacker Value
Unknown
CVE-2023-51126
Disclosure Date: January 10, 2024 (last updated January 18, 2024)
Command injection vulnerability in /usr/www/res.php in FLIR AX8 up to 1.46.16 allows attackers to run arbitrary commands via the value parameter.
0
Attacker Value
Unknown
CVE-2023-29861
Disclosure Date: May 15, 2023 (last updated October 08, 2023)
An issue found in FLIR-DVTEL version not specified allows a remote attacker to execute arbitrary code via a crafted request to the management page of the device.
0
Attacker Value
Unknown
CVE-2022-4364
Disclosure Date: December 08, 2022 (last updated October 08, 2023)
A vulnerability classified as critical has been found in Teledyne FLIR AX8 up to 1.46.16. Affected is an unknown function of the file palette.php of the component Web Service Handler. The manipulation of the argument palette leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-215118 is the identifier assigned to this vulnerability.
0
Attacker Value
Unknown
CVE-2022-37063
Disclosure Date: August 18, 2022 (last updated November 29, 2024)
All FLIR AX8 thermal sensor cameras versions up to and including 1.46.16 are vulnerable to Cross Site Scripting (XSS) due to improper input sanitization. An authenticated remote attacker can execute arbitrary JavaScript code in the web management interface. A successful exploit could allow the attacker to insert malicious JavaScript code.
0
Attacker Value
Unknown
CVE-2022-37062
Disclosure Date: August 18, 2022 (last updated November 29, 2024)
All FLIR AX8 thermal sensor cameras version up to and including 1.46.16 are affected by an insecure design vulnerability due to an improper directory access restriction. An unauthenticated, remote attacker can exploit this by sending a URI that contains the path of the SQLite users database and download it. A successful exploit could allow the attacker to extract usernames and hashed passwords.
0
Attacker Value
Unknown
CVE-2022-37060
Disclosure Date: August 18, 2022 (last updated November 29, 2024)
FLIR AX8 thermal sensor cameras version up to and including 1.46.16 is vulnerable to Directory Traversal due to an improper access restriction. An unauthenticated, remote attacker can exploit this by sending a URI that contains directory traversal characters to disclose the contents of files located outside of the server's restricted path.
0
Attacker Value
Unknown
CVE-2018-12920
Disclosure Date: June 28, 2018 (last updated November 26, 2024)
Brickstream 2300 devices allow remote attackers to obtain potentially sensitive information via a direct request for the basic.html#ipsettings or basic.html#datadelivery URI.
0