CVE-2017-20215
Published: 08 January 2026
Description
FLIR Thermal Camera FC-S/PT firmware version 8.0.0.64 contains an authenticated OS command injection vulnerability that allows attackers to execute shell commands with root privileges. Authenticated attackers can inject arbitrary shell commands through unvalidated input parameters to gain complete control of…
more
the thermal camera system.
Mitigating Controls (NIST 800-53 r5)AI
SI-10 directly and comprehensively prevents OS command injection by requiring validation of unvalidated input parameters used to execute shell commands.
SI-2 requires timely identification, reporting, and remediation of flaws like this specific command injection vulnerability through firmware patching.
AC-6 limits the impact of successful command injection by enforcing least privilege on processes handling authenticated inputs, preventing root-level escalation.
Security SummaryAI
CVE-2017-20215 is an authenticated OS command injection vulnerability (CWE-78) in FLIR Thermal Camera FC-S/PT firmware version 8.0.0.64. The issue stems from unvalidated input parameters that allow attackers to inject and execute arbitrary shell commands with root privileges, potentially granting complete control of the thermal camera system. It carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its network accessibility and impact on confidentiality, integrity, and availability.
An attacker with low-level authenticated access (PR:L) can exploit this vulnerability remotely over the network (AV:N) with low attack complexity (AC:L) and no user interaction required (UI:N). Exploitation enables execution of shell commands as root, allowing full system compromise, including data exfiltration, modification of camera functions, or further pivoting within the network.
Advisories and related resources, including the FLIR security blog and multiple exploit publications, provide details on the issue, with proof-of-concept exploits available on sites such as Exploit-DB and Packet Storm. No specific patch details are outlined in the core CVE information.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Authenticated OS command injection enables arbitrary Unix shell execution (T1059.004) as root, facilitating privilege escalation (T1068) via remote service exploitation (T1210).