CVE-2023-5677

Brandon Rothel from QED Secure Solutions and Sam Hanson of Dragos have found that the VAPIX API tcptest.cgi did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. The impact of exploiting this vulnerability is lower with operator-privileges compared to administrator-privileges service accounts. Please refer to the Axis security advisory for more information and solution.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:axis:m3024-lve_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:axis:m3024-lve:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:axis:m3025-ve_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:axis:m3025-ve:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:axis:m7014_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:axis:m7014:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:axis:m7016_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:axis:m7016:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:axis:p1214-e_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:axis:p1214-e:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:axis:p7214_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:axis:p7214:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:axis:p7216_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:axis:p7216:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:axis:q7401_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:axis:q7401:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:axis:q7404_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:axis:q7404:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:axis:q7414_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:axis:q7414:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:axis:q7424-r_mk_ii_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:axis:q7424-r_mk_ii:-:*:*:*:*:*:*:*

History

15 May 2025, 10:15

Type Values Removed Values Added
References
  • () https://www.axis.com/dam/public/0a/47/d1/cve-2023-5677-en-US-483444.pdf -
Summary (en) Brandon Rothel from QED Secure Solutions has found that the VAPIX API tcptest.cgi did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. The impact of exploiting this vulnerability is lower with operator-privileges compared to administrator-privileges service accounts. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution. (en) Brandon Rothel from QED Secure Solutions and Sam Hanson of Dragos have found that the VAPIX API tcptest.cgi did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. The impact of exploiting this vulnerability is lower with operator-privileges compared to administrator-privileges service accounts. Please refer to the Axis security advisory for more information and solution.

Information

Published : 2024-02-05 06:15

Updated : 2025-05-15 10:15


NVD link : CVE-2023-5677

Mitre link : CVE-2023-5677

CVE.ORG link : CVE-2023-5677


JSON object : View

Products Affected

axis

  • p1214-e_firmware
  • p7214_firmware
  • q7424-r_mk_ii_firmware
  • p7216_firmware
  • p7216
  • m3025-ve_firmware
  • m3024-lve_firmware
  • q7414
  • q7401
  • q7401_firmware
  • p7214
  • m7014_firmware
  • m3024-lve
  • m7016
  • q7404
  • q7414_firmware
  • m7016_firmware
  • m3025-ve
  • m7014
  • p1214-e
  • q7424-r_mk_ii
  • q7404_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-94

Improper Control of Generation of Code ('Code Injection')