CVE-2025-5718

Published Nov 11, 2025

Last updated 4 months ago

Overview

Description
The ACAP Application framework could allow privilege escalation through a symlink attack. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.
Source
product-security@axis.com
NVD status
Analyzed
Products
axis_os

Risk scores

CVSS 3.1

Type
Secondary
Base score
6.8
Impact score
5.9
Exploitability score
0.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
Severity
MEDIUM

Weaknesses

product-security@axis.com
CWE-59

Social media

Hype score
Not currently trending

Configurations

References

Sources include official advisories and independent security research.