{"id":5157,"date":"2025-08-07T14:12:59","date_gmt":"2025-08-07T14:12:59","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/08\/07\/6500-axis-servers-expose-remoting-protocol-4000-in-u-s-vulnerable-to-exploits\/"},"modified":"2025-08-07T14:12:59","modified_gmt":"2025-08-07T14:12:59","slug":"6500-axis-servers-expose-remoting-protocol-4000-in-u-s-vulnerable-to-exploits","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/08\/07\/6500-axis-servers-expose-remoting-protocol-4000-in-u-s-vulnerable-to-exploits\/","title":{"rendered":"6,500 Axis Servers Expose Remoting Protocol, 4,000 in U.S. Vulnerable to Exploits"},"content":{"rendered":"<p>\u200bCybersecurity researchers have disclosed multiple security flaws in video surveillance products from Axis Communications that, if successfully exploited, could expose them to takeover attacks.<br \/>\n&#8220;The attack results in pre-authentication remote code execution on Axis Device Manager, a server used to configure and manage fleets of cameras, and the Axis Camera Station, client software used to view\u00a0Cybersecurity researchers have disclosed multiple security flaws in video surveillance products from Axis Communications that, if successfully exploited, could expose them to takeover attacks.<br \/>\n&#8220;The attack results in pre-authentication remote code execution on Axis Device Manager, a server used to configure and manage fleets of cameras, and the Axis Camera Station, client software used to view\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bCybersecurity researchers have disclosed multiple security flaws in video surveillance products from Axis Communications that, if successfully exploited, could expose them to takeover attacks. &#8220;The attack results in pre-authentication remote code execution on Axis Device Manager, a server used to configure and manage fleets of cameras, and the Axis Camera Station, client software used to&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/08\/07\/6500-axis-servers-expose-remoting-protocol-4000-in-u-s-vulnerable-to-exploits\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">6,500 Axis Servers Expose Remoting Protocol, 4,000 in U.S. Vulnerable to Exploits<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":5158,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/5157"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=5157"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/5157\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/5158"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=5157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=5157"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=5157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}