The Axel Technology StreamerMAX MK II devices (firmware versions 0.8.5 to 1.0.3) are vulnerable to Broken Access Control due to missing authentication on the /cgi-bin/gstFcgi.fcgi endpoint. Unauthenticated remote attackers can list user accounts, create new administrative users, delete users, and modify system settings, leading to full compromise of the device.
References
| Link | Resource |
|---|---|
| https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-63223_Axel%20Technology%20StreamerMAX%20MK%20II%20-%20Broken%20Access%20Control | Exploit Third Party Advisory Mitigation |
| https://www.axeltechnology.com/ | Product |
| https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-63223_Axel%20Technology%20StreamerMAX%20MK%20II%20-%20Broken%20Access%20Control | Exploit Third Party Advisory Mitigation |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-11-19 16:15
Updated : 2026-01-15 19:38
NVD link : CVE-2025-63223
Mitre link : CVE-2025-63223
CVE.ORG link : CVE-2025-63223
JSON object : View
Products Affected
axeltechnology
- streamermax_mk_ii_firmware
- streamermax_mk_ii
CWE
CWE-284
Improper Access Control
