CVE-2025-14577: CWE-306 Missing Authentication for Critical Function in Slican NCP
Slican NCP/IPL/IPM/IPU devices are vulnerable to PHP Function Injection. An unauthenticated remote attacker is able to execute arbitrary PHP commands by sending specially crafted requests to /webcti/session_ajax.php endpoint. This issue was fixed in version 1.24.0190 (Slican NCP) and 6.61.0010 (Slican IPL/IPM/IPU).
AI Analysis
Technical Summary
CVE-2025-14577 is a critical security vulnerability identified in Slican NCP and related devices (IPL/IPM/IPU) that allows unauthenticated remote attackers to perform PHP function injection. The vulnerability stems from missing authentication controls on the /webcti/session_ajax.php endpoint, which processes requests without verifying the identity or privileges of the requester (CWE-306). By sending specially crafted HTTP requests to this endpoint, an attacker can inject and execute arbitrary PHP commands on the device, effectively gaining full control over the system. This can lead to complete compromise, including data theft, device manipulation, or denial of service. The vulnerability affects all versions prior to 1.24.0190 for NCP and 6.61.0010 for IPL/IPM/IPU devices. The issue was assigned a CVSS 4.0 base score of 9.3, indicating critical severity with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the ease of exploitation and severity make this a significant threat. The vulnerability was publicly disclosed and patched in early 2026, emphasizing the need for immediate remediation. The flaw highlights the importance of enforcing authentication on all critical management functions, especially those exposed via web interfaces.
Potential Impact
The impact of CVE-2025-14577 is severe for organizations using affected Slican devices, which are commonly deployed in telecommunications and enterprise telephony infrastructures. Successful exploitation allows attackers to execute arbitrary code remotely without authentication, leading to full system compromise. This can result in unauthorized access to sensitive communications data, interception or manipulation of calls, disruption of telephony services, and potential lateral movement within corporate networks. The compromise of telephony infrastructure can severely disrupt business operations, damage reputation, and lead to regulatory compliance violations. Given the critical role of these devices in communication networks, the vulnerability poses a high risk to confidentiality, integrity, and availability. The lack of authentication and ease of exploitation increase the likelihood of attacks, especially in environments where these devices are exposed to untrusted networks or the internet. Organizations that fail to patch or mitigate this vulnerability may face targeted attacks or opportunistic exploitation by threat actors.
Mitigation Recommendations
To mitigate CVE-2025-14577, organizations should immediately upgrade affected Slican devices to the fixed firmware versions: 1.24.0190 for NCP and 6.61.0010 for IPL/IPM/IPU. Until patches are applied, restrict network access to the management interfaces by implementing network segmentation and firewall rules that limit access to trusted administrators only. Disable or block access to the /webcti/session_ajax.php endpoint if possible. Employ intrusion detection and prevention systems to monitor for suspicious HTTP requests targeting this endpoint. Regularly audit device configurations to ensure no unauthorized changes have been made. Additionally, enforce strong authentication mechanisms on all management interfaces and consider deploying web application firewalls (WAFs) to detect and block injection attempts. Maintain an up-to-date inventory of affected devices to prioritize patching efforts. Finally, monitor threat intelligence feeds for any emerging exploit activity related to this vulnerability.
Affected Countries
Poland, Germany, United Kingdom, France, Italy, Spain, United States, Brazil, Russia, Turkey, India
CVE-2025-14577: CWE-306 Missing Authentication for Critical Function in Slican NCP
Description
Slican NCP/IPL/IPM/IPU devices are vulnerable to PHP Function Injection. An unauthenticated remote attacker is able to execute arbitrary PHP commands by sending specially crafted requests to /webcti/session_ajax.php endpoint. This issue was fixed in version 1.24.0190 (Slican NCP) and 6.61.0010 (Slican IPL/IPM/IPU).
AI-Powered Analysis
Technical Analysis
CVE-2025-14577 is a critical security vulnerability identified in Slican NCP and related devices (IPL/IPM/IPU) that allows unauthenticated remote attackers to perform PHP function injection. The vulnerability stems from missing authentication controls on the /webcti/session_ajax.php endpoint, which processes requests without verifying the identity or privileges of the requester (CWE-306). By sending specially crafted HTTP requests to this endpoint, an attacker can inject and execute arbitrary PHP commands on the device, effectively gaining full control over the system. This can lead to complete compromise, including data theft, device manipulation, or denial of service. The vulnerability affects all versions prior to 1.24.0190 for NCP and 6.61.0010 for IPL/IPM/IPU devices. The issue was assigned a CVSS 4.0 base score of 9.3, indicating critical severity with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the ease of exploitation and severity make this a significant threat. The vulnerability was publicly disclosed and patched in early 2026, emphasizing the need for immediate remediation. The flaw highlights the importance of enforcing authentication on all critical management functions, especially those exposed via web interfaces.
Potential Impact
The impact of CVE-2025-14577 is severe for organizations using affected Slican devices, which are commonly deployed in telecommunications and enterprise telephony infrastructures. Successful exploitation allows attackers to execute arbitrary code remotely without authentication, leading to full system compromise. This can result in unauthorized access to sensitive communications data, interception or manipulation of calls, disruption of telephony services, and potential lateral movement within corporate networks. The compromise of telephony infrastructure can severely disrupt business operations, damage reputation, and lead to regulatory compliance violations. Given the critical role of these devices in communication networks, the vulnerability poses a high risk to confidentiality, integrity, and availability. The lack of authentication and ease of exploitation increase the likelihood of attacks, especially in environments where these devices are exposed to untrusted networks or the internet. Organizations that fail to patch or mitigate this vulnerability may face targeted attacks or opportunistic exploitation by threat actors.
Mitigation Recommendations
To mitigate CVE-2025-14577, organizations should immediately upgrade affected Slican devices to the fixed firmware versions: 1.24.0190 for NCP and 6.61.0010 for IPL/IPM/IPU. Until patches are applied, restrict network access to the management interfaces by implementing network segmentation and firewall rules that limit access to trusted administrators only. Disable or block access to the /webcti/session_ajax.php endpoint if possible. Employ intrusion detection and prevention systems to monitor for suspicious HTTP requests targeting this endpoint. Regularly audit device configurations to ensure no unauthorized changes have been made. Additionally, enforce strong authentication mechanisms on all management interfaces and consider deploying web application firewalls (WAFs) to detect and block injection attempts. Maintain an up-to-date inventory of affected devices to prioritize patching efforts. Finally, monitor threat intelligence feeds for any emerging exploit activity related to this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- CERT-PL
- Date Reserved
- 2025-12-12T13:28:43.671Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699daf6bbe58cf853bdddd5e
Added to database: 2/24/2026, 2:02:19 PM
Last enriched: 2/24/2026, 2:16:55 PM
Last updated: 2/24/2026, 9:32:17 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27195: CWE-755: Improper Handling of Exceptional Conditions in bytecodealliance wasmtime
MediumCVE-2026-25899: CWE-789: Memory Allocation with Excessive Size Value in gofiber fiber
HighCVE-2026-25891: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in gofiber fiber
HighCVE-2026-25882: CWE-129: Improper Validation of Array Index in gofiber fiber
MediumCVE-2026-22553: CWE-78 in InSAT MasterSCADA BUK-TS
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.