51l3nc3, a member of the AXIS OS Bug Bounty Program, has found that the VAPIX API uploadoverlayimage.cgi did not have sufficient input validation to allow an attacker to upload files to block access to create image overlays in the web interface of the Axis device.
History

Wed, 14 Jan 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Axis
Axis axis Os
Axis axis Os 2022
Axis axis Os 2024
CPEs cpe:2.3:o:axis:axis_os:*:*:*:*:active:*:*:*
cpe:2.3:o:axis:axis_os_2022:*:*:*:*:lts:*:*:*
cpe:2.3:o:axis:axis_os_2024:*:*:*:*:lts:*:*:*
Vendors & Products Axis
Axis axis Os
Axis axis Os 2022
Axis axis Os 2024

Tue, 08 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 08 Apr 2025 05:45:00 +0000

Type Values Removed Values Added
Description 51l3nc3, a member of the AXIS OS Bug Bounty Program, has found that the VAPIX API uploadoverlayimage.cgi did not have sufficient input validation to allow an attacker to upload files to block access to create image overlays in the web interface of the Axis device.
Weaknesses CWE-1287
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Axis

Published:

Updated: 2025-04-08T14:50:58.877Z

Reserved: 2024-09-23T16:37:50.255Z

Link: CVE-2024-47261

cve-icon Vulnrichment

Updated: 2025-04-08T13:22:09.498Z

cve-icon NVD

Status : Analyzed

Published: 2025-04-08T06:15:43.053

Modified: 2026-01-14T14:46:03.113

Link: CVE-2024-47261

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.