A configuration file on the local file system had improper input validation which could allow code execution and potentially lead to privilege escalation. This vulnerability can only be exploited if an attacker can log in to the Axis device using SSH.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 12 May 2026 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Improper Input Validation in Configuration File Allows Code Execution on Axis OS | |
| First Time appeared |
Axis Communications Ab
Axis Communications Ab axis Os |
|
| Vendors & Products |
Axis Communications Ab
Axis Communications Ab axis Os |
Tue, 12 May 2026 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A configuration file on the local file system had improper input validation which could allow code execution and potentially lead to privilege escalation. This vulnerability can only be exploited if an attacker can log in to the Axis device using SSH. | |
| Weaknesses | CWE-732 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Axis
Published:
Updated: 2026-05-12T05:49:46.712Z
Reserved: 2026-01-19T13:10:24.354Z
Link: CVE-2026-1185
No data.
Status : Received
Published: 2026-05-12T07:16:09.720
Modified: 2026-05-12T07:16:09.720
Link: CVE-2026-1185
No data.
OpenCVE Enrichment
Updated: 2026-05-12T07:30:10Z
Weaknesses