Home

Description

The VAPIX API mediaclip.cgi that did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator- privileged service account.

PUBLISHED Reserved 2025-09-29 | Published 2026-02-10 | Updated 2026-02-11 | Assigner Axis




HIGH: 7.1CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H

Problem types

CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

Default status
unaffected

12.6.54 (semver)
affected

Credits

51l3nc3 finder

References

www.axis.com/.../18/0e/90/cve-2025-11142pdf-en-US-519291.pdf

cve.org (CVE-2025-11142)

nvd.nist.gov (CVE-2025-11142)

Download JSON