The VAPIX API mediaclip.cgi that did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator- privileged service account.
Metrics
Affected Vendors & Products
References
History
Tue, 10 Feb 2026 06:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The VAPIX API mediaclip.cgi that did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator- privileged service account. | |
| First Time appeared |
Axis Communications Ab
Axis Communications Ab axis Os |
|
| Weaknesses | CWE-78 | |
| CPEs | cpe:2.3:a:axis_communications_ab:axis_os:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Axis Communications Ab
Axis Communications Ab axis Os |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Axis
Published:
Updated: 2026-02-10T05:57:23.202Z
Reserved: 2025-09-29T05:03:19.053Z
Link: CVE-2025-11142
No data.
Status : Received
Published: 2026-02-10T06:15:52.430
Modified: 2026-02-10T06:15:52.430
Link: CVE-2025-11142
No data.
OpenCVE Enrichment
No data.