CVE-2025-5454

Source
https://cve.org/CVERecord?id=CVE-2025-5454
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-5454.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-5454
Published
2025-11-11T07:15:34.937Z
Modified
2026-03-13T03:33:18.296164Z
Severity
  • 6.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An ACAP configuration file lacked sufficient input validation, which could allow a path traversal attack leading to potential privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.

References

Affected packages

Git /

Affected ranges

Database specific

unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "12.0.0"
            },
            {
                "fixed": "12.6.18"
            }
        ]
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-5454.json"