An ACAP configuration file lacked sufficient input...
Moderate severity
Unreviewed
Published
Nov 11, 2025
to the GitHub Advisory Database
•
Updated Nov 11, 2025
Description
Published by the National Vulnerability Database
Nov 11, 2025
Published to the GitHub Advisory Database
Nov 11, 2025
Last updated
Nov 11, 2025
An ACAP configuration file lacked sufficient input validation, which could allow a path traversal attack leading to potential privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.
References