{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-6266","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-06-19T06:02:39.903Z","datePublished":"2025-06-19T12:00:17.929Z","dateUpdated":"2025-10-15T13:18:37.106Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-10-15T13:18:37.106Z"},"title":"Teledyne FLIR AX8 upload.php unrestricted upload","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-434","lang":"en","description":"Unrestricted Upload"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-284","lang":"en","description":"Improper Access Controls"}]}],"affected":[{"vendor":"Teledyne FLIR","product":"AX8","versions":[{"version":"1.0","status":"affected"},{"version":"1.1","status":"affected"},{"version":"1.2","status":"affected"},{"version":"1.3","status":"affected"},{"version":"1.4","status":"affected"},{"version":"1.5","status":"affected"},{"version":"1.6","status":"affected"},{"version":"1.7","status":"affected"},{"version":"1.8","status":"affected"},{"version":"1.9","status":"affected"},{"version":"1.10","status":"affected"},{"version":"1.11","status":"affected"},{"version":"1.12","status":"affected"},{"version":"1.13","status":"affected"},{"version":"1.14","status":"affected"},{"version":"1.15","status":"affected"},{"version":"1.16","status":"affected"},{"version":"1.17","status":"affected"},{"version":"1.18","status":"affected"},{"version":"1.19","status":"affected"},{"version":"1.20","status":"affected"},{"version":"1.21","status":"affected"},{"version":"1.22","status":"affected"},{"version":"1.23","status":"affected"},{"version":"1.24","status":"affected"},{"version":"1.25","status":"affected"},{"version":"1.26","status":"affected"},{"version":"1.27","status":"affected"},{"version":"1.28","status":"affected"},{"version":"1.29","status":"affected"},{"version":"1.30","status":"affected"},{"version":"1.31","status":"affected"},{"version":"1.32","status":"affected"},{"version":"1.33","status":"affected"},{"version":"1.34","status":"affected"},{"version":"1.35","status":"affected"},{"version":"1.36","status":"affected"},{"version":"1.37","status":"affected"},{"version":"1.38","status":"affected"},{"version":"1.39","status":"affected"},{"version":"1.40","status":"affected"},{"version":"1.41","status":"affected"},{"version":"1.42","status":"affected"},{"version":"1.43","status":"affected"},{"version":"1.44","status":"affected"},{"version":"1.45","status":"affected"},{"version":"1.46","status":"affected"},{"version":"1.49.16","status":"unaffected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was detected in Teledyne FLIR AX8 up to 1.46. Affected by this vulnerability is an unknown functionality of the file /upload.php. Performing manipulation of the argument File results in unrestricted upload. It is possible to initiate the attack remotely. The exploit is now public and may be used. Upgrading to version 1.49.16 addresses this issue. Upgrading the affected component is recommended. The vendor points out: \"FLIR AX8 internal web site has been refactored to be able to handle the reported vulnerabilities.\""},{"lang":"de","value":"In Teledyne FLIR AX8 up to 1.46 wurde eine Schwachstelle gefunden. Es ist betroffen eine unbekannte Funktion der Datei /upload.php. Mittels Manipulieren des Arguments File mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Es ist möglich, den Angriff aus der Ferne durchzuführen. Der Exploit steht zur öffentlichen Verfügung. Ein Upgrade auf Version 1.49.16 ist in der Lage, dieses Problem zu adressieren. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"}}],"timeline":[{"time":"2025-06-19T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-06-19T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-10-15T15:23:17.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"XU17 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.313270","name":"VDB-313270 | Teledyne FLIR AX8 upload.php unrestricted upload","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.313270","name":"VDB-313270 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.586692","name":"Submit #586692 | FLIR AX8 <= 1.46 Unauthorized File Upload Vulnerability","tags":["third-party-advisory"]},{"url":"https://github.com/YZS17/CVE/blob/main/FLIR-AX8/Unauthority_file_upload_vulnerabililty.md","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-20T15:39:41.842977Z","id":"CVE-2025-6266","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-20T15:42:09.616Z"}}]}}