Логотип exploitDog
bind:CVE-2025-5718
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-5718

Количество 2

Количество 2

nvd логотип

CVE-2025-5718

3 месяца назад

The ACAP Application framework could allow privilege escalation through a symlink attack. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.

CVSS3: 6.8
EPSS: Низкий
github логотип

GHSA-mvpq-6rgj-x5xq

3 месяца назад

The ACAP Application framework could allow privilege escalation through a symlink attack. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.

CVSS3: 6.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-5718

The ACAP Application framework could allow privilege escalation through a symlink attack. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.

CVSS3: 6.8
0%
Низкий
3 месяца назад
github логотип
GHSA-mvpq-6rgj-x5xq

The ACAP Application framework could allow privilege escalation through a symlink attack. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.

CVSS3: 6.8
0%
Низкий
3 месяца назад

Уязвимостей на страницу