Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Sat, 28 Feb 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Axis
Axis axis Os |
|
| CPEs | cpe:2.3:o:axis:axis_os:*:*:*:*:active:*:*:* | |
| Vendors & Products |
Axis
Axis axis Os |
Tue, 10 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Feb 2026 06:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The VAPIX API mediaclip.cgi that did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator- privileged service account. | |
| First Time appeared |
Axis Communications Ab
Axis Communications Ab axis Os |
|
| Weaknesses | CWE-78 | |
| CPEs | cpe:2.3:a:axis_communications_ab:axis_os:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Axis Communications Ab
Axis Communications Ab axis Os |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Axis
Published:
Updated: 2026-02-26T15:04:12.975Z
Reserved: 2025-09-29T05:03:19.053Z
Link: CVE-2025-11142
Updated: 2026-02-10T15:19:03.445Z
Status : Analyzed
Published: 2026-02-10T06:15:52.430
Modified: 2026-02-28T00:09:21.760
Link: CVE-2025-11142
No data.
OpenCVE Enrichment
Updated: 2026-02-10T11:34:34Z