CVE-2025-6779

Source
https://cve.org/CVERecord?id=CVE-2025-6779
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-6779.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-6779
Published
2025-11-11T07:15:35.777Z
Modified
2026-03-13T03:42:15.036169Z
Severity
  • 6.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An ACAP configuration file has improper permissions, which could allow command injection and potentially lead to privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.

References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-6779.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "12.0.0"
            },
            {
                "fixed": "12.6.40"
            }
        ]
    }
]