CVE-2025-5718

Source
https://cve.org/CVERecord?id=CVE-2025-5718
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-5718.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-5718
Published
2025-11-11T07:15:35.220Z
Modified
2026-03-13T03:36:27.276387Z
Severity
  • 6.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

The ACAP Application framework could allow privilege escalation through a symlink attack. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.

References

Affected packages

Git /

Affected ranges

Database specific

unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "12.0.0"
            },
            {
                "fixed": "12.6.30"
            }
        ]
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-5718.json"