An ACAP configuration file lacked sufficient input validation, which could allow for arbitrary code execution. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.
References
| Link | Resource |
|---|---|
| https://www.axis.com/dam/public/ab/9a/a5/cve-2025-30027pdf-en-US-492762.pdf | Vendor Advisory |
Configurations
History
13 Jan 2026, 18:54
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Axis axis Os
Axis |
|
| References | () https://www.axis.com/dam/public/ab/9a/a5/cve-2025-30027pdf-en-US-492762.pdf - Vendor Advisory | |
| CPE | cpe:2.3:o:axis:axis_os:*:*:*:*:active:*:*:* |
12 Aug 2025, 14:25
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
12 Aug 2025, 06:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-08-12 06:15
Updated : 2026-01-13 18:54
NVD link : CVE-2025-30027
Mitre link : CVE-2025-30027
CVE.ORG link : CVE-2025-30027
JSON object : View
Products Affected
axis
- axis_os
CWE
CWE-1287
Improper Validation of Specified Type of Input
