Unauthenticated Vulnerability in FLIR Brickstream 3D+ REST API
CVE-2018-25137

8.7HIGH

Key Information:

Vendor
CVE Published:
24 December 2025

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2018-25137?

The FLIR Brickstream 3D+ version 2.1.742.1842 is affected by an unauthenticated vulnerability within its ExportConfig REST API. Attackers can leverage this weakness through the getConfigExportFile.cgi endpoint to download sensitive configuration files. This exposure may lead to further security risks, including potential authentication bypass and privilege escalation, compromising the integrity and confidentiality of the system.

Affected Version(s)

FLIR Brickstream 3D+ 2.1.742.1842

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

LiquidWorm as Gjoko Krstic of Zero Science Lab
.
CVE-2018-25137 : Unauthenticated Vulnerability in FLIR Brickstream 3D+ REST API