CVE-2025-5126: Command Injection in Teledyne FLIR AX8
A vulnerability was found in Teledyne FLIR AX8 up to 1.46.16. This vulnerability affects the function setDataTime of the file \usr\www\application\models\settingsregional.php. Performing manipulation of the argument year/month/day/hour/minute results in command injection. The attack may be initiated remotely. The exploit has been made public and could be used. Upgrading to version 1.49.16 is able to resolve this issue. Upgrading the affected component is recommended. The vendor points out: "FLIR AX8 internal web site has been refactored to be able to handle the reported vulnerabilities."
AI Analysis
Technical Summary
CVE-2025-5126 is a remote command injection vulnerability identified in the Teledyne FLIR AX8 thermal imaging camera devices running firmware versions up to 1.46.16. The vulnerability resides in the setDataTime function of the settingsregional.php file located at \usr\www\application\models\. This function processes date and time parameters such as year, month, day, hour, and minute. Improper input sanitization allows an attacker to inject arbitrary commands by manipulating these parameters. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it highly dangerous. The CVSS 4.0 score of 8.7 reflects its critical nature, with network attack vector, low attack complexity, and no privileges or user interaction needed. Successful exploitation could allow attackers to execute arbitrary commands on the device, potentially leading to full device compromise, data exfiltration, or pivoting into internal networks. The vendor has addressed the issue in firmware version 1.49.16 by refactoring the internal web interface to handle input safely. Although no active exploitation has been reported, the public availability of exploit code increases the risk of imminent attacks. The affected product, FLIR AX8, is widely used in industrial monitoring, building automation, and critical infrastructure sectors, making this vulnerability a significant concern for organizations relying on these devices.
Potential Impact
For European organizations, the impact of CVE-2025-5126 can be severe, especially for those deploying FLIR AX8 devices in critical infrastructure such as energy plants, manufacturing facilities, and smart buildings. Exploitation could lead to unauthorized remote command execution, resulting in disruption of monitoring capabilities, manipulation of sensor data, or use of the compromised device as a foothold for lateral movement within corporate networks. This could affect operational continuity, safety monitoring, and compliance with regulatory requirements such as NIS2. Additionally, compromised devices could be leveraged to launch further attacks or exfiltrate sensitive data. Given the device’s role in physical environment monitoring, attackers might also cause physical damage or safety hazards by interfering with automated controls. The high severity and ease of exploitation make timely remediation essential to prevent potential operational and reputational damage.
Mitigation Recommendations
1. Immediately upgrade all Teledyne FLIR AX8 devices to firmware version 1.49.16 or later to apply the official patch. 2. Implement network segmentation to isolate FLIR AX8 devices from critical internal networks and limit exposure to untrusted networks. 3. Restrict access to the device management interface using firewall rules and VPNs to reduce attack surface. 4. Monitor network traffic for unusual activity targeting the device’s web interface, especially suspicious requests manipulating date/time parameters. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics for command injection attempts against FLIR AX8 devices. 6. Regularly audit device configurations and logs for signs of compromise or unauthorized changes. 7. Coordinate with vendors and suppliers to ensure timely updates and vulnerability disclosures. 8. Consider deploying application-layer gateways or web application firewalls (WAFs) to filter malicious input targeting the vulnerable function.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Spain, Belgium, Sweden, Poland, Finland
CVE-2025-5126: Command Injection in Teledyne FLIR AX8
Description
A vulnerability was found in Teledyne FLIR AX8 up to 1.46.16. This vulnerability affects the function setDataTime of the file \usr\www\application\models\settingsregional.php. Performing manipulation of the argument year/month/day/hour/minute results in command injection. The attack may be initiated remotely. The exploit has been made public and could be used. Upgrading to version 1.49.16 is able to resolve this issue. Upgrading the affected component is recommended. The vendor points out: "FLIR AX8 internal web site has been refactored to be able to handle the reported vulnerabilities."
AI-Powered Analysis
Technical Analysis
CVE-2025-5126 is a remote command injection vulnerability identified in the Teledyne FLIR AX8 thermal imaging camera devices running firmware versions up to 1.46.16. The vulnerability resides in the setDataTime function of the settingsregional.php file located at \usr\www\application\models\. This function processes date and time parameters such as year, month, day, hour, and minute. Improper input sanitization allows an attacker to inject arbitrary commands by manipulating these parameters. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it highly dangerous. The CVSS 4.0 score of 8.7 reflects its critical nature, with network attack vector, low attack complexity, and no privileges or user interaction needed. Successful exploitation could allow attackers to execute arbitrary commands on the device, potentially leading to full device compromise, data exfiltration, or pivoting into internal networks. The vendor has addressed the issue in firmware version 1.49.16 by refactoring the internal web interface to handle input safely. Although no active exploitation has been reported, the public availability of exploit code increases the risk of imminent attacks. The affected product, FLIR AX8, is widely used in industrial monitoring, building automation, and critical infrastructure sectors, making this vulnerability a significant concern for organizations relying on these devices.
Potential Impact
For European organizations, the impact of CVE-2025-5126 can be severe, especially for those deploying FLIR AX8 devices in critical infrastructure such as energy plants, manufacturing facilities, and smart buildings. Exploitation could lead to unauthorized remote command execution, resulting in disruption of monitoring capabilities, manipulation of sensor data, or use of the compromised device as a foothold for lateral movement within corporate networks. This could affect operational continuity, safety monitoring, and compliance with regulatory requirements such as NIS2. Additionally, compromised devices could be leveraged to launch further attacks or exfiltrate sensitive data. Given the device’s role in physical environment monitoring, attackers might also cause physical damage or safety hazards by interfering with automated controls. The high severity and ease of exploitation make timely remediation essential to prevent potential operational and reputational damage.
Mitigation Recommendations
1. Immediately upgrade all Teledyne FLIR AX8 devices to firmware version 1.49.16 or later to apply the official patch. 2. Implement network segmentation to isolate FLIR AX8 devices from critical internal networks and limit exposure to untrusted networks. 3. Restrict access to the device management interface using firewall rules and VPNs to reduce attack surface. 4. Monitor network traffic for unusual activity targeting the device’s web interface, especially suspicious requests manipulating date/time parameters. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics for command injection attempts against FLIR AX8 devices. 6. Regularly audit device configurations and logs for signs of compromise or unauthorized changes. 7. Coordinate with vendors and suppliers to ensure timely updates and vulnerability disclosures. 8. Consider deploying application-layer gateways or web application firewalls (WAFs) to filter malicious input targeting the vulnerable function.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-23T18:09:10.108Z
- Cisa Enriched
- false
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6831e0a60acd01a24927cffa
Added to database: 5/24/2025, 3:07:18 PM
Last enriched: 10/15/2025, 1:40:35 PM
Last updated: 11/22/2025, 4:43:31 PM
Views: 32
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighCVE-2024-13976: CWE-427 Uncontrolled Search Path Element in Commvault Commvault for Windows
HighCVE-2024-12856: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Four-Faith F3x24
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.