Skip to main content

CVE-2025-7578: Command Injection in Teledyne FLIR FB-Series O

Low
VulnerabilityCVE-2025-7578cvecve-2025-7578
Published: Mon Jul 14 2025 (07/14/2025, 06:02:05 UTC)
Source: CVE Database V5
Vendor/Project: Teledyne
Product: FLIR FB-Series O

Description

A vulnerability was found in Teledyne FLIR FB-Series O and FLIR FH-Series ID 1.3.2.16. It has been declared as critical. This vulnerability affects the function sendCommand of the file runcmd.sh. The manipulation of the argument cmd leads to command injection. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The researcher highlights, that "[a]lthough this functionality is currently disabled due to server CGI configuration errors, it is essentially a 'time bomb' waiting to be activated". The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/14/2025, 06:31:20 UTC

Technical Analysis

CVE-2025-7578 is a command injection vulnerability identified in Teledyne FLIR FB-Series O and FLIR FH-Series devices running firmware version 1.3.2.16. The vulnerability resides in the sendCommand function within the runcmd.sh script, where improper sanitization of the 'cmd' argument allows an attacker to inject arbitrary commands. This flaw could potentially enable remote attackers to execute commands on the affected device. However, exploitation complexity is rated as high, and the attack is considered difficult to carry out. Notably, the vulnerable functionality is currently disabled due to server CGI configuration errors, which acts as a mitigating factor. Despite this, the vulnerability is described as a 'time bomb' because if the CGI configuration changes or is corrected, the command injection vector could become active and exploitable. The vendor, Teledyne, was contacted early but has not responded or issued a patch, leaving the vulnerability unmitigated. The CVSS 4.0 base score is low (2.3), reflecting the high attack complexity, limited scope, and the current disabled state of the vulnerable functionality. No known exploits are reported in the wild at this time. The vulnerability affects a niche set of industrial or specialized thermal imaging devices, which are often used in security, surveillance, and industrial monitoring contexts.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the deployment of Teledyne FLIR FB-Series O and FH-Series devices within their infrastructure. These devices are typically used in critical infrastructure monitoring, security surveillance, and industrial environments. If exploited, an attacker could execute arbitrary commands remotely, potentially leading to unauthorized control over the device, disruption of monitoring capabilities, or pivoting into broader network environments. This could compromise the confidentiality and integrity of monitored data and availability of surveillance systems. However, given the current disabled state of the vulnerable functionality and the high complexity of exploitation, immediate risk is low. Nonetheless, the lack of vendor response and patch availability means that if the CGI configuration is altered or corrected inadvertently, the vulnerability could become active, increasing risk. European organizations in sectors such as energy, transportation, manufacturing, and public safety that rely on FLIR devices should be particularly vigilant. Additionally, the potential for this vulnerability to be a 'time bomb' means that long-term risk management and monitoring are critical.

Mitigation Recommendations

1. Immediate assessment of the deployment of affected Teledyne FLIR FB-Series O and FH-Series devices within the organization is essential. Identify all devices running firmware version 1.3.2.16. 2. Verify the current CGI server configuration to ensure that the vulnerable sendCommand functionality remains disabled. Avoid any changes that might enable this functionality inadvertently. 3. Implement network segmentation and strict access controls to limit remote access to these devices, reducing the attack surface. 4. Monitor device logs and network traffic for unusual command execution attempts or anomalies that could indicate exploitation attempts. 5. Engage with Teledyne support channels persistently to request patches or official guidance, documenting all communications. 6. Consider deploying compensating controls such as Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with custom rules to detect and block suspicious command injection patterns targeting these devices. 7. Plan for firmware upgrades or device replacement if and when a patch becomes available. 8. Educate operational technology (OT) and security teams about this vulnerability and the importance of maintaining current configurations and monitoring.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-13T07:47:21.683Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6874a0a5a83201eaacc25f34

Added to database: 7/14/2025, 6:16:05 AM

Last enriched: 7/14/2025, 6:31:20 AM

Last updated: 7/16/2025, 4:16:36 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats