{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T01:44:15.395","vulnerabilities":[{"cve":{"id":"CVE-2023-51127","sourceIdentifier":"cve@mitre.org","published":"2024-01-10T21:15:09.133","lastModified":"2025-10-17T20:15:36.583","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"FLIR AX8 thermal sensor cameras up to and including 1.46.16 are vulnerable to Directory Traversal due to improper access restriction. This vulnerability allows an unauthenticated, remote attacker to obtain arbitrary sensitive file contents by uploading a specially crafted symbolic link file. NOTE: The vendor has stated that with the introduction of firmware version 1.49.16 (Jan 2023) the FLIR AX8 should no longer be affected by the vulnerability reported. Latest firmware version (as of Oct 2025, was released Jun 2024) is 1.55.16."},{"lang":"es","value":"Las cámaras con sensor térmico FLIR AX8 hasta la versión 1.46.16 incluida son vulnerables a Directory Traversal debido a una restricción de acceso inadecuada. Esta vulnerabilidad permite que un atacante remoto no autenticado obtenga contenidos de archivos confidenciales arbitrarios cargando un archivo de enlace simbólico especialmente manipulado."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:flir:flir_ax8_firmware:1.46.16:*:*:*:*:*:*:*","matchCriteriaId":"0FF2D4C9-9444-4F42-8729-761A4C5B2670"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:flir:flir_ax8:-:*:*:*:*:*:*:*","matchCriteriaId":"2A4DACB7-0558-4C74-8EDB-39591236ADEE"}]}]}],"references":[{"url":"https://github.com/risuxx/CVE-2023-51127","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://github.com/risuxx/CVE-2023-51127","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}