Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11142: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Axis Communications AB AXIS OS

0
High
VulnerabilityCVE-2025-11142cvecve-2025-11142cwe-78
Published: Tue Feb 10 2026 (02/10/2026, 05:32:19 UTC)
Source: CVE Database V5
Vendor/Project: Axis Communications AB
Product: AXIS OS

Description

CVE-2025-11142 is a high-severity OS command injection vulnerability in Axis Communications AB's AXIS OS version 12. 6. 54, specifically in the VAPIX API mediaclip. cgi endpoint. The flaw arises from insufficient input validation, allowing authenticated users with operator or administrator privileges to execute arbitrary OS commands remotely. Exploitation does not require user interaction but does require valid privileged credentials. While no known exploits are currently observed in the wild, successful exploitation can lead to significant availability impact and integrity compromise. European organizations using AXIS OS devices, particularly in security and surveillance sectors, are at risk. Mitigation involves applying vendor patches once available, restricting privileged account access, and monitoring API usage for anomalous commands. Countries with high Axis device deployments and critical infrastructure reliance on surveillance systems, such as Germany, France, the UK, and the Nordics, are most likely affected.

AI-Powered Analysis

AILast updated: 02/17/2026, 09:24:47 UTC

Technical Analysis

CVE-2025-11142 is an OS command injection vulnerability identified in the AXIS OS version 12.6.54, used by Axis Communications AB in their network video products. The vulnerability exists in the VAPIX API endpoint mediaclip.cgi, which lacks sufficient input validation for parameters passed to the operating system commands. This improper neutralization of special elements (CWE-78) allows an authenticated attacker with operator or administrator privileges to inject and execute arbitrary OS commands remotely. The attack vector is network-based, requiring no user interaction but does require valid privileged credentials, limiting exploitation to authorized users or those who have compromised such accounts. The vulnerability impacts the integrity and availability of the affected system by enabling command execution that could disrupt device operation or alter system configurations. Although no public exploits are currently known, the ease of exploitation given network access and privileged credentials makes this a significant risk. The CVSS v3.1 base score is 7.1, with metrics indicating network attack vector (AV:N), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), low integrity impact (I:L), and high availability impact (A:H). This vulnerability is particularly critical for organizations relying on Axis network video products for security and surveillance, as it could allow attackers to disrupt monitoring capabilities or gain further footholds within the network.

Potential Impact

For European organizations, the impact of CVE-2025-11142 can be substantial, especially for those in critical infrastructure sectors such as transportation, energy, government facilities, and public safety that rely heavily on Axis network video devices for surveillance and monitoring. Successful exploitation could lead to denial of service or manipulation of video feeds, undermining physical security and situational awareness. The integrity of device configurations could be compromised, potentially allowing attackers to establish persistent access or pivot to other internal systems. Although confidentiality is not directly impacted, the loss of availability and integrity in security devices can have cascading effects on organizational security posture and incident response capabilities. Additionally, the requirement for privileged authentication means insider threats or credential compromise scenarios are particularly concerning. Given the widespread use of Axis devices across Europe, disruption or compromise could affect large-scale surveillance operations and public safety monitoring, leading to operational downtime and reputational damage.

Mitigation Recommendations

1. Apply patches or firmware updates from Axis Communications as soon as they are released to address CVE-2025-11142. 2. Restrict access to the VAPIX API and mediaclip.cgi endpoint to trusted networks and users only, using network segmentation and firewall rules. 3. Enforce strong authentication and credential management policies for operator and administrator accounts, including multi-factor authentication where possible. 4. Monitor logs and network traffic for unusual API calls or command execution attempts indicative of exploitation attempts. 5. Regularly audit and rotate privileged credentials to reduce the risk of credential compromise. 6. Implement intrusion detection/prevention systems (IDS/IPS) tuned to detect command injection patterns targeting Axis devices. 7. Limit the number of users with operator or administrator privileges to the minimum necessary. 8. Conduct security awareness training focused on credential security and phishing to prevent account compromise. 9. Consider deploying endpoint protection solutions on management workstations to detect lateral movement attempts originating from compromised devices. 10. Maintain an incident response plan that includes scenarios involving surveillance device compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Axis
Date Reserved
2025-09-29T05:03:19.053Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698ac9b04b57a58fa1e63de3

Added to database: 2/10/2026, 6:01:20 AM

Last enriched: 2/17/2026, 9:24:47 AM

Last updated: 2/21/2026, 12:20:09 AM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats