AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to and including 2.6.23 include a web administration component (F2MAdmin) that exposes an unauthenticated prompt upload endpoint at AudioCodes_files/utils/IVR/diagram/ajaxPromptUploadFile.php. The script accepts an uploaded file and writes it into the C:\\F2MAdmin\\tmp directory using a filename derived from application constants, without any authentication, authorization, or file-type validation. A remote, unauthenticated attacker can upload or overwrite prompt- or music-on-hold–related files in this directory, potentially leading to tampering with IVR audio content or preparing files for use in further attacks.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 12 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Audiocodes fax Server
Audiocodes interactive Voice Response
CPEs cpe:2.3:a:audiocodes:fax_server:*:*:*:*:*:*:*:*
cpe:2.3:a:audiocodes:interactive_voice_response:*:*:*:*:*:*:*:*
Vendors & Products Audiocodes fax Server
Audiocodes interactive Voice Response
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Thu, 20 Nov 2025 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Audiocodes
Audiocodes fax\/ivr
CPEs cpe:2.3:h:audiocodes:fax\/ivr:*:*:*:*:*:*:*:*
Vendors & Products Audiocodes
Audiocodes fax\/ivr

Wed, 19 Nov 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 19 Nov 2025 16:45:00 +0000

Type Values Removed Values Added
Description AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to and including 2.6.23 include a web administration component (F2MAdmin) that exposes an unauthenticated prompt upload endpoint at AudioCodes_files/utils/IVR/diagram/ajaxPromptUploadFile.php. The script accepts an uploaded file and writes it into the C:\\F2MAdmin\\tmp directory using a filename derived from application constants, without any authentication, authorization, or file-type validation. A remote, unauthenticated attacker can upload or overwrite prompt- or music-on-hold–related files in this directory, potentially leading to tampering with IVR audio content or preparing files for use in further attacks.
Title AudioCodes Fax/IVR Appliance <= 2.6.23 Unauthenticated Prompt File Upload via ajaxPromptUploadFile.php
Weaknesses CWE-434
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-11-20T15:21:16.834Z

Reserved: 2025-04-15T19:15:22.586Z

Link: CVE-2025-34330

cve-icon Vulnrichment

Updated: 2025-11-19T16:47:38.964Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-19T17:15:47.777

Modified: 2025-12-12T16:06:47.503

Link: CVE-2025-34330

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses