Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5695: Command Injection in Teledyne FLIR AX8

0
Medium
VulnerabilityCVE-2025-5695cvecve-2025-5695
Published: Thu Jun 05 2025 (06/05/2025, 21:00:21 UTC)
Source: CVE Database V5
Vendor/Project: Teledyne FLIR
Product: AX8

Description

A vulnerability has been found in Teledyne FLIR AX8 up to 1.46.16. This impacts the function subscribe_to_spot/subscribe_to_delta/subscribe_to_alarm of the file /usr/www/application/models/subscriptions.php of the component Backend. Such manipulation leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.49.16 will fix this issue. It is suggested to upgrade the affected component. The vendor points out: "FLIR AX8 internal web site has been refactored to be able to handle the reported vulnerabilities."

AI-Powered Analysis

AILast updated: 10/15/2025, 13:41:00 UTC

Technical Analysis

CVE-2025-5695 is a command injection vulnerability identified in the Teledyne FLIR AX8 thermal monitoring device firmware versions 1.46.0 through 1.46.16. The vulnerability resides in the backend PHP component, specifically within the functions subscribe_to_spot, subscribe_to_delta, and subscribe_to_alarm in the /usr/www/application/models/subscriptions.php file. These functions handle subscription requests for various alert types. Due to insufficient input validation or sanitization, an attacker can inject arbitrary commands that the system executes with the privileges of the backend process. The vulnerability is remotely exploitable over the network without requiring user interaction but does require the attacker to have high privileges, indicating some form of authentication or elevated access is needed. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) reflects a medium severity with partial impacts on confidentiality, integrity, and availability. The vendor has addressed the issue in firmware version 1.49.16 by refactoring the internal web interface to handle these vulnerabilities properly. Although no active exploits have been reported in the wild, the public disclosure of the vulnerability increases the risk of exploitation. The flaw could allow attackers to execute arbitrary commands remotely, potentially leading to unauthorized data access, system manipulation, or denial of service conditions on affected devices.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, particularly for those relying on FLIR AX8 devices for critical thermal monitoring in industrial, infrastructure, or security environments. Successful exploitation could allow attackers to execute arbitrary commands remotely, potentially leading to unauthorized access to sensitive operational data, manipulation of device functions, or disruption of monitoring capabilities. This could affect operational continuity, safety monitoring, and incident response effectiveness. Confidentiality may be compromised if attackers extract sensitive data, while integrity and availability could be degraded if attackers alter device behavior or cause service interruptions. Given the medium severity and requirement for high privileges, the risk is elevated in environments where device access controls are weak or where attackers can escalate privileges. The public disclosure and availability of patches mean organizations delaying updates face increased exposure to targeted attacks or automated exploitation attempts.

Mitigation Recommendations

European organizations should immediately verify the firmware versions of their deployed FLIR AX8 devices and prioritize upgrading to version 1.49.16 or later to remediate the vulnerability. Network segmentation should be enforced to restrict access to device management interfaces, limiting exposure to trusted administrators only. Implement strong authentication and access control mechanisms to prevent unauthorized privilege escalation. Regularly audit device logs and monitor network traffic for unusual commands or subscription requests that could indicate exploitation attempts. Employ intrusion detection systems tuned to detect command injection patterns targeting FLIR AX8 devices. Additionally, disable or restrict unnecessary subscription features if not in use to reduce the attack surface. Establish a patch management process to ensure timely application of vendor updates and maintain an inventory of all IoT and OT devices to facilitate vulnerability management. Finally, conduct security awareness training for personnel managing these devices to recognize and respond to potential compromise indicators.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-04T20:22:18.880Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 684208c0182aa0cae2f126f7

Added to database: 6/5/2025, 9:14:40 PM

Last enriched: 10/15/2025, 1:41:00 PM

Last updated: 11/20/2025, 11:39:12 PM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats