Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 12 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Audiocodes fax Server
Audiocodes interactive Voice Response |
|
| CPEs | cpe:2.3:a:audiocodes:fax_server:*:*:*:*:*:*:*:* cpe:2.3:a:audiocodes:interactive_voice_response:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Audiocodes fax Server
Audiocodes interactive Voice Response |
|
| Metrics |
cvssV3_1
|
Thu, 20 Nov 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Audiocodes
Audiocodes fax\/ivr |
|
| CPEs | cpe:2.3:h:audiocodes:fax\/ivr:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Audiocodes
Audiocodes fax\/ivr |
Wed, 19 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 19 Nov 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to and including 2.6.23 expose an unauthenticated backup upload endpoint at AudioCodes_files/ajaxBackupUploadFile.php in the F2MAdmin web interface. The script derives a backup folder path from application configuration, creates the directory if it does not exist, and then moves an uploaded file to that location using the attacker-controlled filename, without any authentication, authorization, or file-type validation. On default Windows deployments where the backup directory resolves to the system drive, a remote attacker can upload web server or interpreter configuration files that cause a log file or other server-controlled resource to be treated as executable code. This allows subsequent HTTP requests to trigger arbitrary command execution under the web server account, which runs as NT AUTHORITY\\SYSTEM. | |
| Title | AudioCodes Fax/IVR Appliance <= 2.6.23 Unauthenticated Backup Upload RCE via ajaxBackupUploadFile.php | |
| Weaknesses | CWE-434 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-11-20T15:21:16.647Z
Reserved: 2025-04-15T19:15:22.586Z
Link: CVE-2025-34329
Updated: 2025-11-19T16:48:57.715Z
Status : Analyzed
Published: 2025-11-19T17:15:47.613
Modified: 2025-12-12T16:09:44.737
Link: CVE-2025-34329
No data.
OpenCVE Enrichment
No data.