Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5127: Cross Site Scripting in Teledyne FLIR AX8

0
Medium
VulnerabilityCVE-2025-5127cvecve-2025-5127
Published: Sat May 24 2025 (05/24/2025, 15:31:04 UTC)
Source: CVE
Vendor/Project: Teledyne FLIR
Product: AX8

Description

A vulnerability was determined in Teledyne FLIR AX8 up to 1.46.16. This issue affects some unknown processing of the file /prod.php. Executing manipulation of the argument cmd can lead to cross site scripting. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 1.49.16 is capable of addressing this issue. It is recommended to upgrade the affected component. The vendor points out: "FLIR AX8 internal web site has been refactored to be able to handle the reported vulnerabilities."

AI-Powered Analysis

AILast updated: 10/15/2025, 13:40:49 UTC

Technical Analysis

CVE-2025-5127 is a cross-site scripting vulnerability identified in Teledyne FLIR AX8 thermal camera devices running firmware versions up to 1.46.16. The vulnerability is located in the processing of the 'cmd' argument within the /prod.php endpoint of the device's internal web server. Improper sanitization or validation of this parameter allows an attacker to inject malicious JavaScript code, which can be executed in the context of an authenticated user's browser session. This XSS flaw can be exploited remotely without requiring prior authentication, though it does require user interaction, such as clicking a malicious link or visiting a crafted webpage. The impact primarily affects confidentiality and integrity by enabling session hijacking, credential theft, or unauthorized command execution within the web interface. Availability is not directly impacted. The vendor has publicly disclosed the vulnerability and released firmware version 1.49.16, which refactors the internal web interface to remediate the issue. The CVSS 4.0 base score is 5.1 (medium severity), reflecting the ease of remote exploitation, lack of required privileges, but the necessity of user interaction and limited impact scope. No known exploits have been observed in the wild yet, but public disclosure increases risk. The FLIR AX8 is commonly used in industrial monitoring, security, and critical infrastructure environments, making this vulnerability relevant for organizations relying on these devices for operational safety and security.

Potential Impact

For European organizations, the vulnerability poses a risk primarily to the confidentiality and integrity of device management sessions. Attackers exploiting this XSS flaw could hijack authenticated sessions, steal credentials, or perform unauthorized actions on the FLIR AX8 device's web interface. This could lead to manipulation of thermal monitoring data, disruption of security monitoring, or unauthorized access to sensitive operational information. Organizations in sectors such as manufacturing, energy, transportation, and public safety that deploy FLIR AX8 cameras for monitoring critical infrastructure or security perimeters are particularly at risk. Compromise of these devices could facilitate broader attacks on industrial control systems or physical security. While the vulnerability does not directly affect availability, the indirect consequences of unauthorized access could impact operational continuity. The medium severity rating suggests a moderate risk, but the presence of publicly disclosed exploit details necessitates prompt action to prevent targeted attacks, especially in high-value environments prevalent in Europe.

Mitigation Recommendations

European organizations using Teledyne FLIR AX8 devices should immediately upgrade all affected devices to firmware version 1.49.16 or later, which contains the vendor's fix for this XSS vulnerability. Beyond patching, organizations should implement network segmentation to isolate FLIR AX8 devices from general user networks and restrict access to their web management interfaces to trusted administrators only, ideally via VPN or secure management networks. Employ web application firewalls (WAFs) or intrusion detection systems (IDS) to monitor and block suspicious HTTP requests targeting the /prod.php endpoint or containing suspicious 'cmd' parameter values. Conduct user awareness training to reduce the risk of social engineering attacks that could trigger user interaction with malicious links. Regularly audit device configurations and logs for signs of unauthorized access or anomalous activity. Finally, coordinate with asset owners to maintain an accurate inventory of deployed FLIR AX8 devices and ensure timely firmware updates as part of vulnerability management processes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-23T18:09:27.021Z
Cisa Enriched
false
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6831eb200acd01a24927d322

Added to database: 5/24/2025, 3:52:00 PM

Last enriched: 10/15/2025, 1:40:49 PM

Last updated: 11/22/2025, 5:55:37 PM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats