CVE-2025-5127: Cross Site Scripting in Teledyne FLIR AX8
A vulnerability was determined in Teledyne FLIR AX8 up to 1.46.16. This issue affects some unknown processing of the file /prod.php. Executing manipulation of the argument cmd can lead to cross site scripting. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 1.49.16 is capable of addressing this issue. It is recommended to upgrade the affected component. The vendor points out: "FLIR AX8 internal web site has been refactored to be able to handle the reported vulnerabilities."
AI Analysis
Technical Summary
CVE-2025-5127 is a cross-site scripting vulnerability identified in Teledyne FLIR AX8 thermal camera devices running firmware versions up to 1.46.16. The vulnerability is located in the processing of the 'cmd' argument within the /prod.php endpoint of the device's internal web server. Improper sanitization or validation of this parameter allows an attacker to inject malicious JavaScript code, which can be executed in the context of an authenticated user's browser session. This XSS flaw can be exploited remotely without requiring prior authentication, though it does require user interaction, such as clicking a malicious link or visiting a crafted webpage. The impact primarily affects confidentiality and integrity by enabling session hijacking, credential theft, or unauthorized command execution within the web interface. Availability is not directly impacted. The vendor has publicly disclosed the vulnerability and released firmware version 1.49.16, which refactors the internal web interface to remediate the issue. The CVSS 4.0 base score is 5.1 (medium severity), reflecting the ease of remote exploitation, lack of required privileges, but the necessity of user interaction and limited impact scope. No known exploits have been observed in the wild yet, but public disclosure increases risk. The FLIR AX8 is commonly used in industrial monitoring, security, and critical infrastructure environments, making this vulnerability relevant for organizations relying on these devices for operational safety and security.
Potential Impact
For European organizations, the vulnerability poses a risk primarily to the confidentiality and integrity of device management sessions. Attackers exploiting this XSS flaw could hijack authenticated sessions, steal credentials, or perform unauthorized actions on the FLIR AX8 device's web interface. This could lead to manipulation of thermal monitoring data, disruption of security monitoring, or unauthorized access to sensitive operational information. Organizations in sectors such as manufacturing, energy, transportation, and public safety that deploy FLIR AX8 cameras for monitoring critical infrastructure or security perimeters are particularly at risk. Compromise of these devices could facilitate broader attacks on industrial control systems or physical security. While the vulnerability does not directly affect availability, the indirect consequences of unauthorized access could impact operational continuity. The medium severity rating suggests a moderate risk, but the presence of publicly disclosed exploit details necessitates prompt action to prevent targeted attacks, especially in high-value environments prevalent in Europe.
Mitigation Recommendations
European organizations using Teledyne FLIR AX8 devices should immediately upgrade all affected devices to firmware version 1.49.16 or later, which contains the vendor's fix for this XSS vulnerability. Beyond patching, organizations should implement network segmentation to isolate FLIR AX8 devices from general user networks and restrict access to their web management interfaces to trusted administrators only, ideally via VPN or secure management networks. Employ web application firewalls (WAFs) or intrusion detection systems (IDS) to monitor and block suspicious HTTP requests targeting the /prod.php endpoint or containing suspicious 'cmd' parameter values. Conduct user awareness training to reduce the risk of social engineering attacks that could trigger user interaction with malicious links. Regularly audit device configurations and logs for signs of unauthorized access or anomalous activity. Finally, coordinate with asset owners to maintain an accurate inventory of deployed FLIR AX8 devices and ensure timely firmware updates as part of vulnerability management processes.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Spain, Poland, Belgium, Sweden, Finland
CVE-2025-5127: Cross Site Scripting in Teledyne FLIR AX8
Description
A vulnerability was determined in Teledyne FLIR AX8 up to 1.46.16. This issue affects some unknown processing of the file /prod.php. Executing manipulation of the argument cmd can lead to cross site scripting. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 1.49.16 is capable of addressing this issue. It is recommended to upgrade the affected component. The vendor points out: "FLIR AX8 internal web site has been refactored to be able to handle the reported vulnerabilities."
AI-Powered Analysis
Technical Analysis
CVE-2025-5127 is a cross-site scripting vulnerability identified in Teledyne FLIR AX8 thermal camera devices running firmware versions up to 1.46.16. The vulnerability is located in the processing of the 'cmd' argument within the /prod.php endpoint of the device's internal web server. Improper sanitization or validation of this parameter allows an attacker to inject malicious JavaScript code, which can be executed in the context of an authenticated user's browser session. This XSS flaw can be exploited remotely without requiring prior authentication, though it does require user interaction, such as clicking a malicious link or visiting a crafted webpage. The impact primarily affects confidentiality and integrity by enabling session hijacking, credential theft, or unauthorized command execution within the web interface. Availability is not directly impacted. The vendor has publicly disclosed the vulnerability and released firmware version 1.49.16, which refactors the internal web interface to remediate the issue. The CVSS 4.0 base score is 5.1 (medium severity), reflecting the ease of remote exploitation, lack of required privileges, but the necessity of user interaction and limited impact scope. No known exploits have been observed in the wild yet, but public disclosure increases risk. The FLIR AX8 is commonly used in industrial monitoring, security, and critical infrastructure environments, making this vulnerability relevant for organizations relying on these devices for operational safety and security.
Potential Impact
For European organizations, the vulnerability poses a risk primarily to the confidentiality and integrity of device management sessions. Attackers exploiting this XSS flaw could hijack authenticated sessions, steal credentials, or perform unauthorized actions on the FLIR AX8 device's web interface. This could lead to manipulation of thermal monitoring data, disruption of security monitoring, or unauthorized access to sensitive operational information. Organizations in sectors such as manufacturing, energy, transportation, and public safety that deploy FLIR AX8 cameras for monitoring critical infrastructure or security perimeters are particularly at risk. Compromise of these devices could facilitate broader attacks on industrial control systems or physical security. While the vulnerability does not directly affect availability, the indirect consequences of unauthorized access could impact operational continuity. The medium severity rating suggests a moderate risk, but the presence of publicly disclosed exploit details necessitates prompt action to prevent targeted attacks, especially in high-value environments prevalent in Europe.
Mitigation Recommendations
European organizations using Teledyne FLIR AX8 devices should immediately upgrade all affected devices to firmware version 1.49.16 or later, which contains the vendor's fix for this XSS vulnerability. Beyond patching, organizations should implement network segmentation to isolate FLIR AX8 devices from general user networks and restrict access to their web management interfaces to trusted administrators only, ideally via VPN or secure management networks. Employ web application firewalls (WAFs) or intrusion detection systems (IDS) to monitor and block suspicious HTTP requests targeting the /prod.php endpoint or containing suspicious 'cmd' parameter values. Conduct user awareness training to reduce the risk of social engineering attacks that could trigger user interaction with malicious links. Regularly audit device configurations and logs for signs of unauthorized access or anomalous activity. Finally, coordinate with asset owners to maintain an accurate inventory of deployed FLIR AX8 devices and ensure timely firmware updates as part of vulnerability management processes.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-23T18:09:27.021Z
- Cisa Enriched
- false
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6831eb200acd01a24927d322
Added to database: 5/24/2025, 3:52:00 PM
Last enriched: 10/15/2025, 1:40:49 PM
Last updated: 11/22/2025, 5:55:37 PM
Views: 33
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services
MediumCVE-2025-2655: SQL Injection in SourceCodester AC Repair and Services System
MediumCVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.