A configuration file on the local file system had improper input validation which could allow code execution and potentially lead to privilege escalation. This vulnerability can only be exploited if an attacker can log in to the Axis device using SSH.
Metrics
Affected Vendors & Products
References
History
Tue, 12 May 2026 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Improper Input Validation in Configuration File Allows Code Execution on Axis OS | |
| First Time appeared |
Axis Communications Ab
Axis Communications Ab axis Os |
|
| Vendors & Products |
Axis Communications Ab
Axis Communications Ab axis Os |
Tue, 12 May 2026 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A configuration file on the local file system had improper input validation which could allow code execution and potentially lead to privilege escalation. This vulnerability can only be exploited if an attacker can log in to the Axis device using SSH. | |
| Weaknesses | CWE-732 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Axis
Published:
Updated: 2026-05-12T05:49:46.712Z
Reserved: 2026-01-19T13:10:24.354Z
Link: CVE-2026-1185
No data.
Status : Received
Published: 2026-05-12T07:16:09.720
Modified: 2026-05-12T07:16:09.720
Link: CVE-2026-1185
No data.
OpenCVE Enrichment
Updated: 2026-05-12T07:30:10Z