Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63223: n/a

0
Critical
VulnerabilityCVE-2025-63223cvecve-2025-63223
Published: Wed Nov 19 2025 (11/19/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

The Axel Technology StreamerMAX MK II devices (firmware versions 0.8.5 to 1.0.3) are vulnerable to Broken Access Control due to missing authentication on the /cgi-bin/gstFcgi.fcgi endpoint. Unauthenticated remote attackers can list user accounts, create new administrative users, delete users, and modify system settings, leading to full compromise of the device.

AI-Powered Analysis

AILast updated: 11/19/2025, 16:24:07 UTC

Technical Analysis

CVE-2025-63223 is a security vulnerability identified in Axel Technology StreamerMAX MK II devices, specifically affecting firmware versions 0.8.5 through 1.0.3. The root cause is a Broken Access Control flaw stemming from the absence of authentication mechanisms on the /cgi-bin/gstFcgi.fcgi endpoint. This endpoint is accessible remotely and allows unauthenticated attackers to perform sensitive operations such as enumerating existing user accounts, creating new administrative users, deleting legitimate users, and altering system configurations. The lack of authentication means that an attacker does not need any credentials or prior access to exploit this vulnerability. The consequence is a full compromise of the device, granting attackers administrative privileges and control over the device’s functionality. This can lead to unauthorized access to network streams, manipulation of device settings, and potentially pivoting to other network assets. No CVSS score has been assigned yet, and no public exploits have been reported, but the vulnerability’s nature suggests a high risk. The vulnerability was published on November 19, 2025, shortly after being reserved on October 27, 2025, indicating recent discovery. The absence of patches or firmware updates at the time of reporting means organizations must rely on interim mitigations. Given the device’s role in streaming and network operations, exploitation could disrupt services or facilitate broader network intrusions.

Potential Impact

For European organizations, the impact of CVE-2025-63223 is significant. The ability for unauthenticated attackers to fully compromise StreamerMAX MK II devices can lead to unauthorized access to sensitive streaming data and network resources. This can result in confidentiality breaches if sensitive content or data streams are intercepted or manipulated. Integrity is at risk as attackers can modify system settings, potentially altering device behavior or injecting malicious configurations. Availability may also be affected if attackers disable or disrupt device functions. Organizations relying on these devices for critical communication, media streaming, or network monitoring could experience operational disruptions. Additionally, compromised devices can serve as footholds for lateral movement within corporate networks, increasing the risk of broader cyberattacks. The lack of authentication and ease of exploitation heighten the threat level, especially in sectors such as media, telecommunications, and critical infrastructure. European entities with limited patch management capabilities or those operating in high-threat environments face increased exposure.

Mitigation Recommendations

To mitigate CVE-2025-63223, organizations should immediately restrict network access to the /cgi-bin/gstFcgi.fcgi endpoint by implementing firewall rules or access control lists that limit access to trusted administrative networks only. Network segmentation should be employed to isolate StreamerMAX MK II devices from general user networks and the internet. Monitoring and logging of access attempts to the vulnerable endpoint should be enhanced to detect potential exploitation attempts. Organizations should engage with Axel Technology to obtain firmware updates or patches addressing this vulnerability and prioritize their deployment once available. In the interim, consider disabling or limiting the functionality of the vulnerable endpoint if device configuration allows. Conduct thorough audits of user accounts on affected devices to identify unauthorized additions or changes. Employ strong network-level authentication and VPNs for remote administrative access to reduce exposure. Finally, incorporate this vulnerability into incident response plans and conduct staff awareness training focused on device security and anomaly detection.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691dec83964c14ffeeaeeaec

Added to database: 11/19/2025, 4:12:51 PM

Last enriched: 11/19/2025, 4:24:07 PM

Last updated: 11/20/2025, 8:00:19 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats