CVE-2025-6266: Unrestricted Upload in Teledyne FLIR AX8
A vulnerability was detected in Teledyne FLIR AX8 up to 1.46. Affected by this vulnerability is an unknown functionality of the file /upload.php. Performing manipulation of the argument File results in unrestricted upload. It is possible to initiate the attack remotely. The exploit is now public and may be used. Upgrading to version 1.49.16 addresses this issue. Upgrading the affected component is recommended. The vendor points out: "FLIR AX8 internal web site has been refactored to be able to handle the reported vulnerabilities."
AI Analysis
Technical Summary
CVE-2025-6266 is an unrestricted file upload vulnerability found in Teledyne FLIR AX8 thermal imaging cameras running firmware versions up to 1.46. The vulnerability resides in the /upload.php functionality, where the 'File' parameter is insufficiently validated, allowing an attacker to remotely upload arbitrary files without requiring authentication or user interaction. This flaw enables attackers to potentially execute malicious code, alter device configurations, or disrupt device operations, impacting confidentiality, integrity, and availability. The vulnerability is remotely exploitable over the network with low attack complexity and no privileges required, though the CVSS vector indicates a low scope and partial impact on confidentiality, integrity, and availability. The vendor has released version 1.49.16, which refactors the internal web interface to remediate this issue. No known exploits are currently reported in the wild, but public exploit code availability increases the risk of exploitation. The affected device, FLIR AX8, is commonly used in industrial monitoring, building automation, and critical infrastructure environments, making this vulnerability a significant concern for organizations relying on these devices for operational safety and security.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for those in sectors such as energy, manufacturing, transportation, and critical infrastructure where FLIR AX8 devices are deployed for thermal monitoring and safety. Exploitation could allow attackers to upload malicious payloads, potentially leading to unauthorized access, data leakage, manipulation of sensor data, or denial of service conditions. This could disrupt operational technology environments, cause safety hazards, or facilitate lateral movement within networks. Given the device's role in monitoring physical environments, compromise could also affect physical security and safety systems. The medium severity rating reflects a moderate but tangible risk, particularly in environments where these devices are internet-facing or insufficiently segmented. The availability of public exploit code increases the urgency for European entities to address this vulnerability promptly to prevent targeted attacks or opportunistic exploitation.
Mitigation Recommendations
1. Immediately upgrade all Teledyne FLIR AX8 devices to firmware version 1.49.16 or later, as provided by the vendor, to remediate the unrestricted upload vulnerability. 2. Restrict network access to the device management interfaces by implementing network segmentation and firewall rules, ensuring that only authorized personnel and systems can reach the /upload.php endpoint. 3. Employ strong authentication and access control mechanisms on device management portals to prevent unauthorized access. 4. Monitor network traffic for unusual upload activity or attempts to access the /upload.php endpoint, using intrusion detection/prevention systems tailored for industrial control systems. 5. Conduct regular security audits and vulnerability assessments on operational technology devices to identify and remediate similar issues proactively. 6. Where possible, isolate FLIR AX8 devices from direct internet exposure and use VPNs or secure tunnels for remote management. 7. Maintain an inventory of all deployed FLIR AX8 devices and verify firmware versions to ensure timely patching. 8. Educate operational technology and security teams about the risks associated with device vulnerabilities and the importance of timely updates.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Finland
CVE-2025-6266: Unrestricted Upload in Teledyne FLIR AX8
Description
A vulnerability was detected in Teledyne FLIR AX8 up to 1.46. Affected by this vulnerability is an unknown functionality of the file /upload.php. Performing manipulation of the argument File results in unrestricted upload. It is possible to initiate the attack remotely. The exploit is now public and may be used. Upgrading to version 1.49.16 addresses this issue. Upgrading the affected component is recommended. The vendor points out: "FLIR AX8 internal web site has been refactored to be able to handle the reported vulnerabilities."
AI-Powered Analysis
Technical Analysis
CVE-2025-6266 is an unrestricted file upload vulnerability found in Teledyne FLIR AX8 thermal imaging cameras running firmware versions up to 1.46. The vulnerability resides in the /upload.php functionality, where the 'File' parameter is insufficiently validated, allowing an attacker to remotely upload arbitrary files without requiring authentication or user interaction. This flaw enables attackers to potentially execute malicious code, alter device configurations, or disrupt device operations, impacting confidentiality, integrity, and availability. The vulnerability is remotely exploitable over the network with low attack complexity and no privileges required, though the CVSS vector indicates a low scope and partial impact on confidentiality, integrity, and availability. The vendor has released version 1.49.16, which refactors the internal web interface to remediate this issue. No known exploits are currently reported in the wild, but public exploit code availability increases the risk of exploitation. The affected device, FLIR AX8, is commonly used in industrial monitoring, building automation, and critical infrastructure environments, making this vulnerability a significant concern for organizations relying on these devices for operational safety and security.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for those in sectors such as energy, manufacturing, transportation, and critical infrastructure where FLIR AX8 devices are deployed for thermal monitoring and safety. Exploitation could allow attackers to upload malicious payloads, potentially leading to unauthorized access, data leakage, manipulation of sensor data, or denial of service conditions. This could disrupt operational technology environments, cause safety hazards, or facilitate lateral movement within networks. Given the device's role in monitoring physical environments, compromise could also affect physical security and safety systems. The medium severity rating reflects a moderate but tangible risk, particularly in environments where these devices are internet-facing or insufficiently segmented. The availability of public exploit code increases the urgency for European entities to address this vulnerability promptly to prevent targeted attacks or opportunistic exploitation.
Mitigation Recommendations
1. Immediately upgrade all Teledyne FLIR AX8 devices to firmware version 1.49.16 or later, as provided by the vendor, to remediate the unrestricted upload vulnerability. 2. Restrict network access to the device management interfaces by implementing network segmentation and firewall rules, ensuring that only authorized personnel and systems can reach the /upload.php endpoint. 3. Employ strong authentication and access control mechanisms on device management portals to prevent unauthorized access. 4. Monitor network traffic for unusual upload activity or attempts to access the /upload.php endpoint, using intrusion detection/prevention systems tailored for industrial control systems. 5. Conduct regular security audits and vulnerability assessments on operational technology devices to identify and remediate similar issues proactively. 6. Where possible, isolate FLIR AX8 devices from direct internet exposure and use VPNs or secure tunnels for remote management. 7. Maintain an inventory of all deployed FLIR AX8 devices and verify firmware versions to ensure timely patching. 8. Educate operational technology and security teams about the risks associated with device vulnerabilities and the importance of timely updates.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-19T06:02:39.903Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6853ffb833c7acc0460987d7
Added to database: 6/19/2025, 12:16:56 PM
Last enriched: 10/15/2025, 1:41:18 PM
Last updated: 11/22/2025, 4:44:11 PM
Views: 38
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighCVE-2024-13976: CWE-427 Uncontrolled Search Path Element in Commvault Commvault for Windows
HighCVE-2024-12856: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Four-Faith F3x24
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.