Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-51126: n/a

0
Critical
VulnerabilityCVE-2023-51126cvecve-2023-51126
Published: Wed Jan 10 2024 (01/10/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Command injection vulnerability in /usr/www/res.php in FLIR AX8 up to 1.46.16 allows attackers to run arbitrary commands via the value parameter. NOTE: The vendor has stated that with the introduction of firmware version 1.49.16 (Jan 2023) the FLIR AX8 should no longer be affected by the vulnerability reported. Latest firmware version (as of Oct 2025, was released Jun 2024) is 1.55.16.

AI-Powered Analysis

AILast updated: 10/17/2025, 19:31:43 UTC

Technical Analysis

CVE-2023-51126 is a critical command injection vulnerability identified in the FLIR AX8 thermal imaging camera devices running firmware versions up to 1.46.16. The vulnerability resides in the /usr/www/res.php script, specifically in the handling of the 'value' parameter, which is susceptible to injection of arbitrary shell commands. This allows an unauthenticated remote attacker to execute arbitrary commands on the device with the privileges of the web server process, potentially leading to full system compromise. The vulnerability is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command), indicating that input is not properly sanitized before being passed to system commands. The CVSS v3.1 base score is 9.8, reflecting the high impact on confidentiality, integrity, and availability, combined with network attack vector, no required privileges, and no user interaction. The vendor has released firmware version 1.49.16 in January 2023 to address this issue, and the latest firmware version 1.55.16 (released June 2024) remains unaffected. While no public exploits have been observed, the vulnerability's nature and severity make it a critical risk for environments deploying these devices. FLIR AX8 cameras are commonly used in industrial monitoring, security, and building management systems, making them attractive targets for attackers seeking to disrupt operations or gain footholds in critical infrastructure.

Potential Impact

For European organizations, the impact of CVE-2023-51126 can be severe. Exploitation allows attackers to execute arbitrary commands remotely without authentication, potentially leading to full device compromise. This can result in unauthorized access to sensitive thermal imaging data, disruption of monitoring and security functions, and use of compromised devices as pivot points for lateral movement within networks. Critical infrastructure sectors such as manufacturing, energy, transportation, and public safety that rely on FLIR AX8 devices for environmental and security monitoring are at heightened risk. The compromise could lead to operational downtime, data breaches, and safety hazards. Given the criticality of the vulnerability and the widespread use of FLIR devices in European industrial and security contexts, failure to patch could expose organizations to espionage, sabotage, or ransomware attacks. Additionally, regulatory compliance risks arise if organizations fail to adequately secure these devices, potentially leading to penalties under GDPR or sector-specific regulations.

Mitigation Recommendations

European organizations should immediately verify the firmware version of all deployed FLIR AX8 devices and upgrade any running versions earlier than 1.49.16 to the latest available firmware (currently 1.55.16). Network segmentation should be employed to isolate these devices from general enterprise networks, limiting exposure to potential attackers. Access to device management interfaces should be restricted via firewalls and VPNs, and monitoring for unusual command execution or network traffic should be implemented. Where possible, disable unnecessary services and interfaces on the devices to reduce the attack surface. Organizations should also review and update incident response plans to include potential compromises of IoT and industrial devices like FLIR AX8. Regular vulnerability scanning and penetration testing focusing on IoT devices can help detect unpatched systems. Finally, maintain close communication with the vendor for any future security advisories or patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-12-18T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f2961c9c34d0947f3d74d3

Added to database: 10/17/2025, 7:16:44 PM

Last enriched: 10/17/2025, 7:31:43 PM

Last updated: 10/19/2025, 9:12:45 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats