{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-5126","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-05-23T18:09:10.108Z","datePublished":"2025-05-24T15:00:10.190Z","dateUpdated":"2025-10-15T13:18:48.138Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-10-15T13:18:48.138Z"},"title":"Teledyne FLIR AX8 settingsregional.php setDataTime command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"Teledyne FLIR","product":"AX8","versions":[{"version":"1.46.0","status":"affected"},{"version":"1.46.1","status":"affected"},{"version":"1.46.2","status":"affected"},{"version":"1.46.3","status":"affected"},{"version":"1.46.4","status":"affected"},{"version":"1.46.5","status":"affected"},{"version":"1.46.6","status":"affected"},{"version":"1.46.7","status":"affected"},{"version":"1.46.8","status":"affected"},{"version":"1.46.9","status":"affected"},{"version":"1.46.10","status":"affected"},{"version":"1.46.11","status":"affected"},{"version":"1.46.12","status":"affected"},{"version":"1.46.13","status":"affected"},{"version":"1.46.14","status":"affected"},{"version":"1.46.15","status":"affected"},{"version":"1.46.16","status":"affected"},{"version":"1.49.16","status":"unaffected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Teledyne FLIR AX8 up to 1.46.16. This vulnerability affects the function setDataTime of the file \\usr\\www\\application\\models\\settingsregional.php. Performing manipulation of the argument year/month/day/hour/minute results in command injection. The attack may be initiated remotely. The exploit has been made public and could be used. Upgrading to version 1.49.16 is able to resolve this issue. Upgrading the affected component is recommended. The vendor points out: \"FLIR AX8 internal web site has been refactored to be able to handle the reported vulnerabilities.\""},{"lang":"de","value":"Eine Schwachstelle wurde in Teledyne FLIR AX8 up to 1.46.16 gefunden. Es geht um die Funktion setDataTime der Datei \\usr\\www\\application\\models\\settingsregional.php. Mittels Manipulieren des Arguments year/month/day/hour/minute mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Die Ausnutzung wurde veröffentlicht und kann verwendet werden. Ein Upgrade auf Version 1.49.16 ist in der Lage, dieses Problem zu adressieren. Die Aktualisierung der betroffenen Komponente wird empfohlen."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":8.7,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P","baseSeverity":"HIGH"}},{"cvssV3_1":{"version":"3.1","baseScore":8.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":8.8,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":9,"vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:OF/RC:C"}}],"timeline":[{"time":"2025-05-23T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-05-23T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-10-15T15:23:27.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"XU17 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.310204","name":"VDB-310204 | Teledyne FLIR AX8 settingsregional.php setDataTime command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.310204","name":"VDB-310204 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.570725","name":"Submit #570725 | FLIR AX8 <= 1.46 Remote Command Injection","tags":["third-party-advisory"]},{"url":"https://vuldb.com/?submit.572266","name":"Submit #572266 | FLIR AX8 <= 1.46 Remote Command Injection (Duplicate)","tags":["third-party-advisory"]},{"url":"https://vuldb.com/?submit.572275","name":"Submit #572275 | FLIR AX8 <= 1.46 Remote Command Injection (Duplicate)","tags":["third-party-advisory"]},{"url":"https://vuldb.com/?submit.572277","name":"Submit #572277 | FLIR AX8 <= 1.46 Remote Command Injection (Duplicate)","tags":["third-party-advisory"]},{"url":"https://github.com/YZS17/CVE/blob/main/Remote%20Command%20Injection%20in%20parameter%20%24minute.md","tags":["broken-link"]},{"url":"https://github.com/YZS17/CVE/blob/main/Remote%20Command%20Injection%20in%20parameter%20%24hour.md","tags":["broken-link","exploit"]}]},"adp":[{"references":[{"url":"https://github.com/YZS17/CVE/blob/main/Remote%20Command%20Injection%20in%20parameter%20%24minute.md","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-05-27T14:23:29.951841Z","id":"CVE-2025-5126","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-28T17:40:27.474Z"}}]}}