CVE-2025-63223: n/a
The Axel Technology StreamerMAX MK II devices (firmware versions 0.8.5 to 1.0.3) are vulnerable to Broken Access Control due to missing authentication on the /cgi-bin/gstFcgi.fcgi endpoint. Unauthenticated remote attackers can list user accounts, create new administrative users, delete users, and modify system settings, leading to full compromise of the device.
AI Analysis
Technical Summary
CVE-2025-63223 is a critical broken access control vulnerability in Axel Technology StreamerMAX MK II devices with firmware versions 0.8.5 through 1.0.3. The vulnerability exists because the /cgi-bin/gstFcgi.fcgi endpoint lacks any authentication checks, allowing unauthenticated remote attackers to perform administrative actions. Specifically, attackers can enumerate existing user accounts, create new administrative users, delete legitimate users, and alter system configurations. This level of access effectively grants full control over the device, enabling attackers to manipulate device behavior, potentially pivot within networks, or disrupt services. The vulnerability is classified under CWE-284 (Improper Access Control) and has a CVSS v3.1 base score of 9.8, reflecting its critical nature. The attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and affects confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been reported yet, the simplicity of exploitation and the severity of impact make this a high-risk vulnerability. The affected devices are typically used in streaming or media distribution contexts, which may be integral to organizational operations. The absence of authentication on a sensitive endpoint represents a fundamental security design flaw, necessitating urgent remediation.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to complete takeover of StreamerMAX MK II devices, resulting in unauthorized access to sensitive media streams, disruption of streaming services, and potential lateral movement within internal networks. Confidentiality is compromised as attackers can access user account information and system settings. Integrity is at risk due to the ability to modify configurations and user accounts, potentially enabling persistent backdoors or malicious configurations. Availability may be affected if attackers delete users or misconfigure the device, causing service outages. Organizations relying on these devices for critical media delivery or internal communications could face operational disruptions, reputational damage, and compliance issues, especially under GDPR if personal data is exposed or compromised. The lack of known exploits in the wild does not diminish the urgency, as the vulnerability is straightforward to exploit remotely without authentication. The impact is particularly severe for sectors such as media, broadcasting, education, and corporate environments utilizing these devices for streaming or content distribution.
Mitigation Recommendations
1. Immediately isolate affected StreamerMAX MK II devices from untrusted networks to limit exposure. 2. Implement strict network segmentation and firewall rules to restrict access to the /cgi-bin/gstFcgi.fcgi endpoint, allowing only trusted management hosts. 3. Monitor network traffic for unusual access patterns or attempts to reach the vulnerable endpoint. 4. Contact Axel Technology for firmware updates or patches addressing this vulnerability; prioritize applying any available fixes. 5. If patches are unavailable, consider replacing affected devices with secure alternatives or disabling the vulnerable endpoint if possible. 6. Enforce strong network access controls and multi-factor authentication on management interfaces where feasible. 7. Conduct regular audits of user accounts on these devices to detect unauthorized additions or deletions. 8. Integrate vulnerability scanning for this CVE into routine security assessments to identify any remaining vulnerable devices. 9. Educate IT and security teams about this vulnerability to ensure rapid detection and response. 10. Prepare incident response plans to address potential exploitation scenarios involving these devices.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-63223: n/a
Description
The Axel Technology StreamerMAX MK II devices (firmware versions 0.8.5 to 1.0.3) are vulnerable to Broken Access Control due to missing authentication on the /cgi-bin/gstFcgi.fcgi endpoint. Unauthenticated remote attackers can list user accounts, create new administrative users, delete users, and modify system settings, leading to full compromise of the device.
AI-Powered Analysis
Technical Analysis
CVE-2025-63223 is a critical broken access control vulnerability in Axel Technology StreamerMAX MK II devices with firmware versions 0.8.5 through 1.0.3. The vulnerability exists because the /cgi-bin/gstFcgi.fcgi endpoint lacks any authentication checks, allowing unauthenticated remote attackers to perform administrative actions. Specifically, attackers can enumerate existing user accounts, create new administrative users, delete legitimate users, and alter system configurations. This level of access effectively grants full control over the device, enabling attackers to manipulate device behavior, potentially pivot within networks, or disrupt services. The vulnerability is classified under CWE-284 (Improper Access Control) and has a CVSS v3.1 base score of 9.8, reflecting its critical nature. The attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and affects confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been reported yet, the simplicity of exploitation and the severity of impact make this a high-risk vulnerability. The affected devices are typically used in streaming or media distribution contexts, which may be integral to organizational operations. The absence of authentication on a sensitive endpoint represents a fundamental security design flaw, necessitating urgent remediation.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to complete takeover of StreamerMAX MK II devices, resulting in unauthorized access to sensitive media streams, disruption of streaming services, and potential lateral movement within internal networks. Confidentiality is compromised as attackers can access user account information and system settings. Integrity is at risk due to the ability to modify configurations and user accounts, potentially enabling persistent backdoors or malicious configurations. Availability may be affected if attackers delete users or misconfigure the device, causing service outages. Organizations relying on these devices for critical media delivery or internal communications could face operational disruptions, reputational damage, and compliance issues, especially under GDPR if personal data is exposed or compromised. The lack of known exploits in the wild does not diminish the urgency, as the vulnerability is straightforward to exploit remotely without authentication. The impact is particularly severe for sectors such as media, broadcasting, education, and corporate environments utilizing these devices for streaming or content distribution.
Mitigation Recommendations
1. Immediately isolate affected StreamerMAX MK II devices from untrusted networks to limit exposure. 2. Implement strict network segmentation and firewall rules to restrict access to the /cgi-bin/gstFcgi.fcgi endpoint, allowing only trusted management hosts. 3. Monitor network traffic for unusual access patterns or attempts to reach the vulnerable endpoint. 4. Contact Axel Technology for firmware updates or patches addressing this vulnerability; prioritize applying any available fixes. 5. If patches are unavailable, consider replacing affected devices with secure alternatives or disabling the vulnerable endpoint if possible. 6. Enforce strong network access controls and multi-factor authentication on management interfaces where feasible. 7. Conduct regular audits of user accounts on these devices to detect unauthorized additions or deletions. 8. Integrate vulnerability scanning for this CVE into routine security assessments to identify any remaining vulnerable devices. 9. Educate IT and security teams about this vulnerability to ensure rapid detection and response. 10. Prepare incident response plans to address potential exploitation scenarios involving these devices.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-10-27T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 691dec83964c14ffeeaeeaec
Added to database: 11/19/2025, 4:12:51 PM
Last enriched: 11/26/2025, 5:04:21 PM
Last updated: 1/7/2026, 8:47:46 AM
Views: 32
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.