A command injection (missing input validation, escaping) in the monitoring or memory status web interface in AudioCodes 405HD (firmware 2.2.12) VoIP phone allows an authenticated remote attacker in the same network as the device to trigger OS commands (like starting telnetd or opening a reverse shell) via a POST request to the web server. In combination with another attack (unauthenticated password change), the attacker can circumvent the authentication requirement.
Advisories
Source ID Title
EUVD EUVD EUVD-2018-8068 A command injection (missing input validation, escaping) in the monitoring or memory status web interface in AudioCodes 405HD (firmware 2.2.12) VoIP phone allows an authenticated remote attacker in the same network as the device to trigger OS commands (like starting telnetd or opening a reverse shell) via a POST request to the web server. In combination with another attack (unauthenticated password change), the attacker can circumvent the authentication requirement.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T10:17:38.388Z

Reserved: 2018-08-30T00:00:00

Link: CVE-2018-16216

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-04-25T20:29:01.787

Modified: 2024-11-21T03:52:17.880

Link: CVE-2018-16216

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.