Home

Description

The VAPIX API port.cgi did not have sufficient input validation, which may result in process crashes and impact usability. This vulnerability can only be exploited after authenticating with a viewer- operator- or administrator-privileged service account.

PUBLISHED Reserved 2025-08-27 | Published 2025-11-11 | Updated 2025-11-14 | Assigner Axis




MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Problem types

CWE-1287: Improper Validation of Specified Type of Input

Product status

Default status
unaffected

6.50.0 (semver) before 6.50.5.21
affected

7.0.0 (semver) before 8.40.89
affected

9.0.0 (semver) before 9.80.123
affected

10.0.0 (semver) before 10.12.305
affected

11.0.0 (semver) before 11.11.177
affected

12.0.0 (semver) before 12.7.11
affected

Credits

Mucoze finder

References

www.axis.com/...c/f1/f0/1e/cve-2025-9524pdf-en-US-504220.pdf

cve.org (CVE-2025-9524)

nvd.nist.gov (CVE-2025-9524)

Download JSON