51l3nc3, a member of the AXIS OS Bug Bounty Program, has found that the VAPIX API uploadoverlayimage.cgi did not have sufficient input validation to allow an attacker to upload files to block access to create image overlays in the web interface of the Axis device.
History

Tue, 08 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 08 Apr 2025 05:45:00 +0000

Type Values Removed Values Added
Description 51l3nc3, a member of the AXIS OS Bug Bounty Program, has found that the VAPIX API uploadoverlayimage.cgi did not have sufficient input validation to allow an attacker to upload files to block access to create image overlays in the web interface of the Axis device.
Weaknesses CWE-1287
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Axis

Published:

Updated: 2025-04-08T14:50:58.877Z

Reserved: 2024-09-23T16:37:50.255Z

Link: CVE-2024-47261

cve-icon Vulnrichment

Updated: 2025-04-08T13:22:09.498Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-08T06:15:43.053

Modified: 2025-04-08T18:13:53.347

Link: CVE-2024-47261

cve-icon Redhat

No data.