Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5126: Command Injection in Teledyne FLIR AX8

0
High
VulnerabilityCVE-2025-5126cvecve-2025-5126
Published: Sat May 24 2025 (05/24/2025, 15:00:10 UTC)
Source: CVE
Vendor/Project: Teledyne FLIR
Product: AX8

Description

A vulnerability was found in Teledyne FLIR AX8 up to 1.46.16. This vulnerability affects the function setDataTime of the file \usr\www\application\models\settingsregional.php. Performing manipulation of the argument year/month/day/hour/minute results in command injection. The attack may be initiated remotely. The exploit has been made public and could be used. Upgrading to version 1.49.16 is able to resolve this issue. Upgrading the affected component is recommended. The vendor points out: "FLIR AX8 internal web site has been refactored to be able to handle the reported vulnerabilities."

AI-Powered Analysis

AILast updated: 10/15/2025, 13:40:35 UTC

Technical Analysis

CVE-2025-5126 is a remote command injection vulnerability identified in the Teledyne FLIR AX8 thermal imaging camera devices running firmware versions up to 1.46.16. The vulnerability resides in the setDataTime function of the settingsregional.php file located at \usr\www\application\models\. This function processes date and time parameters such as year, month, day, hour, and minute. Improper input sanitization allows an attacker to inject arbitrary commands by manipulating these parameters. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it highly dangerous. The CVSS 4.0 score of 8.7 reflects its critical nature, with network attack vector, low attack complexity, and no privileges or user interaction needed. Successful exploitation could allow attackers to execute arbitrary commands on the device, potentially leading to full device compromise, data exfiltration, or pivoting into internal networks. The vendor has addressed the issue in firmware version 1.49.16 by refactoring the internal web interface to handle input safely. Although no active exploitation has been reported, the public availability of exploit code increases the risk of imminent attacks. The affected product, FLIR AX8, is widely used in industrial monitoring, building automation, and critical infrastructure sectors, making this vulnerability a significant concern for organizations relying on these devices.

Potential Impact

For European organizations, the impact of CVE-2025-5126 can be severe, especially for those deploying FLIR AX8 devices in critical infrastructure such as energy plants, manufacturing facilities, and smart buildings. Exploitation could lead to unauthorized remote command execution, resulting in disruption of monitoring capabilities, manipulation of sensor data, or use of the compromised device as a foothold for lateral movement within corporate networks. This could affect operational continuity, safety monitoring, and compliance with regulatory requirements such as NIS2. Additionally, compromised devices could be leveraged to launch further attacks or exfiltrate sensitive data. Given the device’s role in physical environment monitoring, attackers might also cause physical damage or safety hazards by interfering with automated controls. The high severity and ease of exploitation make timely remediation essential to prevent potential operational and reputational damage.

Mitigation Recommendations

1. Immediately upgrade all Teledyne FLIR AX8 devices to firmware version 1.49.16 or later to apply the official patch. 2. Implement network segmentation to isolate FLIR AX8 devices from critical internal networks and limit exposure to untrusted networks. 3. Restrict access to the device management interface using firewall rules and VPNs to reduce attack surface. 4. Monitor network traffic for unusual activity targeting the device’s web interface, especially suspicious requests manipulating date/time parameters. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics for command injection attempts against FLIR AX8 devices. 6. Regularly audit device configurations and logs for signs of compromise or unauthorized changes. 7. Coordinate with vendors and suppliers to ensure timely updates and vulnerability disclosures. 8. Consider deploying application-layer gateways or web application firewalls (WAFs) to filter malicious input targeting the vulnerable function.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-23T18:09:10.108Z
Cisa Enriched
false
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6831e0a60acd01a24927cffa

Added to database: 5/24/2025, 3:07:18 PM

Last enriched: 10/15/2025, 1:40:35 PM

Last updated: 11/22/2025, 4:43:31 PM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats