Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 12 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Audiocodes fax Server
Audiocodes interactive Voice Response |
|
| CPEs | cpe:2.3:a:audiocodes:fax_server:*:*:*:*:*:*:*:* cpe:2.3:a:audiocodes:interactive_voice_response:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Audiocodes fax Server
Audiocodes interactive Voice Response |
|
| Metrics |
cvssV3_1
|
Thu, 20 Nov 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Audiocodes
Audiocodes fax\/ivr |
|
| CPEs | cpe:2.3:h:audiocodes:fax\/ivr:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Audiocodes
Audiocodes fax\/ivr |
Wed, 19 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 19 Nov 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to and including 2.6.23 include a web administration component (F2MAdmin) that exposes an unauthenticated prompt upload endpoint at AudioCodes_files/utils/IVR/diagram/ajaxPromptUploadFile.php. The script accepts an uploaded file and writes it into the C:\\F2MAdmin\\tmp directory using a filename derived from application constants, without any authentication, authorization, or file-type validation. A remote, unauthenticated attacker can upload or overwrite prompt- or music-on-hold–related files in this directory, potentially leading to tampering with IVR audio content or preparing files for use in further attacks. | |
| Title | AudioCodes Fax/IVR Appliance <= 2.6.23 Unauthenticated Prompt File Upload via ajaxPromptUploadFile.php | |
| Weaknesses | CWE-434 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-11-20T15:21:16.834Z
Reserved: 2025-04-15T19:15:22.586Z
Link: CVE-2025-34330
Updated: 2025-11-19T16:47:38.964Z
Status : Analyzed
Published: 2025-11-19T17:15:47.777
Modified: 2025-12-12T16:06:47.503
Link: CVE-2025-34330
No data.
OpenCVE Enrichment
No data.