{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-5695","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-06-04T20:22:18.880Z","datePublished":"2025-06-05T21:00:21.192Z","dateUpdated":"2025-10-15T13:18:42.245Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-10-15T13:18:42.245Z"},"title":"Teledyne FLIR AX8 Backend subscriptions.php subscribe_to_alarm command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"Teledyne FLIR","product":"AX8","versions":[{"version":"1.46.0","status":"affected"},{"version":"1.46.1","status":"affected"},{"version":"1.46.2","status":"affected"},{"version":"1.46.3","status":"affected"},{"version":"1.46.4","status":"affected"},{"version":"1.46.5","status":"affected"},{"version":"1.46.6","status":"affected"},{"version":"1.46.7","status":"affected"},{"version":"1.46.8","status":"affected"},{"version":"1.46.9","status":"affected"},{"version":"1.46.10","status":"affected"},{"version":"1.46.11","status":"affected"},{"version":"1.46.12","status":"affected"},{"version":"1.46.13","status":"affected"},{"version":"1.46.14","status":"affected"},{"version":"1.46.15","status":"affected"},{"version":"1.46.16","status":"affected"},{"version":"1.49.16","status":"unaffected"}],"modules":["Backend"]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in Teledyne FLIR AX8 up to 1.46.16. This impacts the function subscribe_to_spot/subscribe_to_delta/subscribe_to_alarm of the file /usr/www/application/models/subscriptions.php of the component Backend. Such manipulation leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.49.16 will fix this issue. It is suggested to upgrade the affected component. The vendor points out: \"FLIR AX8 internal web site has been refactored to be able to handle the reported vulnerabilities.\""},{"lang":"de","value":"In Teledyne FLIR AX8 up to 1.46.16 ist eine Schwachstelle entdeckt worden. Betroffen hiervon ist die Funktion subscribe_to_spot/subscribe_to_delta/subscribe_to_alarm der Datei /usr/www/application/models/subscriptions.php der Komponente Backend. Mittels dem Manipulieren mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Der Angriff kann remote ausgeführt werden. Der Exploit wurde der Öffentlichkeit bekannt gemacht und könnte verwendet werden. Durch ein Upgrade auf Version 1.49.16 kann dieses Problem behoben werden. Es wird empfohlen, die betroffene Komponente zu aktualisieren."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.7,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.7,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:OF/RC:C"}}],"timeline":[{"time":"2025-06-04T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-06-04T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-10-15T15:23:22.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"XU17 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.311211","name":"VDB-311211 | Teledyne FLIR AX8 Backend subscriptions.php subscribe_to_alarm command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.311211","name":"VDB-311211 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.585715","name":"Submit #585715 | FLIR AX8 <= 1.46 Remote Command Injection","tags":["third-party-advisory"]},{"url":"https://vuldb.com/?submit.584532","name":"Submit #584532 | FLIR AX8 <= 1.46 Command Injection (Duplicate)","tags":["third-party-advisory"]},{"url":"https://vuldb.com/?submit.585716","name":"Submit #585716 | FLIR AX8 <= 1.46 Remote Command Injection (Duplicate)","tags":["third-party-advisory"]},{"url":"https://github.com/YZS17/CVE/blob/main/Command%20injection%20vulnerability%20in%20subscribe_to_spot()%20in%20FLIR%20AX8.md","tags":["broken-link"]},{"url":"https://github.com/YZS17/CVE/blob/main/Command%20injection%20vulnerability%20in%20subscribe_to_delta()%20in%20FLIR%20AX8.md","tags":["broken-link","exploit"]},{"url":"https://flir.custhelp.com/app/account/fl_download_software","tags":["patch"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-06T15:34:16.259153Z","id":"CVE-2025-5695","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-06T15:35:15.006Z"}}]}}