First published: Tue Apr 08 2025(Updated: )
51l3nc3, a member of the AXIS OS Bug Bounty Program, has found that the VAPIX API uploadoverlayimage.cgi did not have sufficient input validation to allow an attacker to upload files to block access to create image overlays in the web interface of the Axis device.
Credit: product-security@axis.com
Affected Software | Affected Version | How to fix |
---|---|---|
Axis VAPIX API |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47261 is rated as a medium severity vulnerability due to insufficient input validation allowing file uploads.
To fix CVE-2024-47261, it is recommended to apply the latest security patches provided by Axis for the VAPIX API.
The potential impacts of CVE-2024-47261 include unauthorized access that can disrupt the creation of image overlays in the Axis device's web interface.
CVE-2024-47261 affects the Axis VAPIX API, specifically the uploadoverlayimage.cgi component.
CVE-2024-47261 was discovered by a security researcher named 51l3nc3 as part of the AXIS OS Bug Bounty Program.