CVE-2025-6779

Published Nov 11, 2025

Last updated 4 months ago

Overview

Description
An ACAP configuration file has improper permissions, which could allow command injection and potentially lead to privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.
Source
product-security@axis.com
NVD status
Analyzed
Products
axis_os

Risk scores

CVSS 3.1

Type
Secondary
Base score
6.7
Impact score
5.9
Exploitability score
0.8
Vector string
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Severity
MEDIUM

Weaknesses

product-security@axis.com
CWE-732

Social media

Hype score
Not currently trending

Configurations

References

Sources include official advisories and independent security research.