Girishunawane, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API dynamicoverlay.cgi did not have a sufficient input validation allowing for a possible command injection leading to being able to transfer files to the Axis device with the purpose to exhaust system resources.
Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
Metrics
Affected Vendors & Products
References
History
Tue, 11 Mar 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 04 Mar 2025 05:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Girishunawane, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API dynamicoverlay.cgi did not have a sufficient input validation allowing for a possible command injection leading to being able to transfer files to the Axis device with the purpose to exhaust system resources. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution. | |
Weaknesses | CWE-434 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Axis
Published: 2025-03-04T05:15:16.499Z
Updated: 2025-03-11T16:08:56.160Z
Reserved: 2024-09-23T16:37:50.255Z
Link: CVE-2024-47259

Updated: 2025-03-04T15:18:29.443Z

Status : Received
Published: 2025-03-04T06:15:29.190
Modified: 2025-03-04T06:15:29.190
Link: CVE-2024-47259

No data.