CVE-2026-0804
๐ถ mediumSummary
An ACAP configuration file lacked sufficient input validation, which could allow a path traversal attack leading to potential privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install aย malicious ACAP application.
CVSS Score
6.7
Medium
EPSS Score
0.0
Exploit Probability
Published Date
2026-05-12
First Seen: 2026-05-20
๐ Relative Risk Intelligence
This CVE is Lower Risk - more severe than 48.9% of all 321,566 vulnerabilities in our database.
#164,380
Below average severity
Severity Percentile
๐ฏ CISA SSVC Assessment Updated: May 12, 2026
๐ Exploitation Status
None
No known exploits
โ๏ธ Automatable
NO
Requires human interaction
๐ฅ Technical Impact
Total
Complete system compromise possible
๐ Discovered By
Mucoze
SSVC data provided by
CISA
Last Modified
2026-05-19
Source
NVD ๐
CVSS Vector 3.1
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CWE IDs (Weakness Types)