Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 12 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Audiocodes fax Server
Audiocodes interactive Voice Response |
|
| CPEs | cpe:2.3:a:audiocodes:fax_server:*:*:*:*:*:*:*:* cpe:2.3:a:audiocodes:interactive_voice_response:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Audiocodes fax Server
Audiocodes interactive Voice Response |
|
| Metrics |
cvssV3_1
|
Thu, 20 Nov 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Audiocodes
Audiocodes fax\/ivr |
|
| CPEs | cpe:2.3:h:audiocodes:fax\/ivr:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Audiocodes
Audiocodes fax\/ivr |
Wed, 19 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 19 Nov 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to and including 2.6.23 expose an unauthenticated backup upload endpoint at AudioCodes_files/ajaxBackupUploadFile.php in the F2MAdmin web interface. The script derives a backup folder path from application configuration, creates the directory if it does not exist, and then moves an uploaded file to that location using the attacker-controlled filename, without any authentication, authorization, or file-type validation. On default Windows deployments where the backup directory resolves to the system drive, a remote attacker can upload web server or interpreter configuration files that cause a log file or other server-controlled resource to be treated as executable code. This allows subsequent HTTP requests to trigger arbitrary command execution under the web server account, which runs as NT AUTHORITY\\SYSTEM. | |
| Title | AudioCodes Fax/IVR Appliance <= 2.6.23 Unauthenticated Backup Upload RCE via ajaxBackupUploadFile.php | |
| Weaknesses | CWE-434 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-11-20T15:21:16.647Z
Reserved: 2025-04-15T19:15:22.586Z
Link: CVE-2025-34329
Updated: 2025-11-19T16:48:57.715Z
Status : Analyzed
Published: 2025-11-19T17:15:47.613
Modified: 2025-12-12T16:09:44.737
Link: CVE-2025-34329
No data.
OpenCVE Enrichment
No data.