Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2015-8257
Deferred
More InfoOfficial Page
Source-cret@cert.org
View Known Exploited Vulnerability (KEV) details
Published At-02 May, 2017 | 14:59
Updated At-20 Apr, 2025 | 01:37

The devtools.sh script in AXIS network cameras allows remote authenticated users to execute arbitrary commands via shell metacharacters in the app parameter to (1) app_license.shtml, (2) app_license_custom.shtml, (3) app_index.shtml, or (4) app_params.shtml.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.08.8HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Primary2.09.0HIGH
AV:N/AC:L/Au:S/C:C/I:C/A:C
CPE Matches

axis
axis
>>network_camera_firmware>>-
cpe:2.3:o:axis:network_camera_firmware:-:*:*:*:*:*:*:*
axis
axis
>>cannon_network_camera>>-
cpe:2.3:h:axis:cannon_network_camera:-:*:*:*:*:*:*:*
axis
axis
>>explosion-protected_camera>>-
cpe:2.3:h:axis:explosion-protected_camera:-:*:*:*:*:*:*:*
axis
axis
>>fixed_box_camera>>-
cpe:2.3:h:axis:fixed_box_camera:-:*:*:*:*:*:*:*
axis
axis
>>fixed_bullet_camera>>-
cpe:2.3:h:axis:fixed_bullet_camera:-:*:*:*:*:*:*:*
axis
axis
>>fixed_dome_camera>>-
cpe:2.3:h:axis:fixed_dome_camera:-:*:*:*:*:*:*:*
axis
axis
>>modular_camera>>-
cpe:2.3:h:axis:modular_camera:-:*:*:*:*:*:*:*
axis
axis
>>onboard_camera>>-
cpe:2.3:h:axis:onboard_camera:-:*:*:*:*:*:*:*
axis
axis
>>panoramic_camera>>-
cpe:2.3:h:axis:panoramic_camera:-:*:*:*:*:*:*:*
axis
axis
>>ptz_camera>>-
cpe:2.3:h:axis:ptz_camera:-:*:*:*:*:*:*:*
axis
axis
>>thermal_camera>>-
cpe:2.3:h:axis:thermal_camera:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-77Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://packetstormsecurity.com/files/138083/AXIS-Authenticated-Remote-Command-Execution.htmlcret@cert.org
Exploit
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/92159cret@cert.org
Third Party Advisory
VDB Entry
https://www.exploit-db.com/exploits/40171/cret@cert.org
Exploit
Third Party Advisory
VDB Entry
http://packetstormsecurity.com/files/138083/AXIS-Authenticated-Remote-Command-Execution.htmlaf854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/92159af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
https://www.exploit-db.com/exploits/40171/af854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
VDB Entry
Change History
0Changes found

Details not found