Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34328: CWE-434 Unrestricted Upload of File with Dangerous Type in AudioCodes Limited AudioCodes Fax/IVR Appliance

0
Critical
VulnerabilityCVE-2025-34328cvecve-2025-34328cwe-434
Published: Wed Nov 19 2025 (11/19/2025, 16:22:22 UTC)
Source: CVE Database V5
Vendor/Project: AudioCodes Limited
Product: AudioCodes Fax/IVR Appliance

Description

AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to and including 2.6.23 include a web administration component (F2MAdmin) that exposes an unauthenticated script-management endpoint at AudioCodes_files/utils/IVR/diagram/ajaxScript.php. The saveScript action writes attacker-supplied data directly to a server-side file path under the privileges of the web service account, which runs as NT AUTHORITY\\SYSTEM on Windows deployments. A remote, unauthenticated attacker can write arbitrary files into the product’s web-accessible directory structure and subsequently execute them.

AI-Powered Analysis

AILast updated: 11/26/2025, 17:05:04 UTC

Technical Analysis

CVE-2025-34328 is a critical remote code execution vulnerability affecting AudioCodes Fax Server and Auto-Attendant IVR appliances up to version 2.6.23. The root cause is an unrestricted file upload vulnerability (CWE-434) in the web administration component called F2MAdmin. Specifically, the ajaxScript.php endpoint exposes a saveScript action that allows unauthenticated attackers to upload arbitrary files to the server. These files are saved under the privileges of the web service account, which runs as NT AUTHORITY\SYSTEM on Windows deployments, granting full system-level control. Because the uploaded files reside in a web-accessible directory, attackers can execute malicious scripts remotely without any authentication or user interaction. The vulnerability is severe due to the combination of unauthenticated access, high privilege execution context, and the ability to execute arbitrary code remotely. The CVSS 4.0 vector reflects these factors with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. No patches or exploit code are currently publicly available, but the risk is substantial given the critical nature of the flaw and the widespread use of AudioCodes appliances in enterprise telephony environments.

Potential Impact

For European organizations, the impact of this vulnerability is significant. AudioCodes appliances are commonly deployed in telecommunications infrastructure, enterprise voice systems, and unified communications environments. Exploitation could lead to complete system compromise, allowing attackers to intercept or manipulate voice communications, disrupt fax and IVR services, or use the compromised appliance as a foothold for lateral movement within corporate networks. This could result in data breaches, service outages, and reputational damage. Critical sectors such as finance, government, healthcare, and telecommunications in Europe rely heavily on secure voice infrastructure, making them prime targets. The ability to execute code as SYSTEM without authentication amplifies the threat, potentially enabling ransomware deployment or espionage activities. The lack of known exploits in the wild suggests a window for proactive defense, but also a risk that attackers may develop exploits rapidly given the high severity.

Mitigation Recommendations

1. Immediately restrict network access to the AudioCodes Fax/IVR appliance management interfaces, ideally limiting access to trusted internal IPs or via VPN. 2. Monitor web server logs and file directories for unusual file uploads or execution attempts, focusing on the ajaxScript.php endpoint and web-accessible directories. 3. Implement web application firewalls (WAF) with rules to detect and block suspicious file upload patterns targeting this endpoint. 4. Apply vendor patches or updates as soon as they become available; if no patch exists yet, consider temporary compensating controls such as disabling the vulnerable web administration component or isolating the appliance from untrusted networks. 5. Conduct thorough audits of existing appliances to identify any signs of compromise or unauthorized file uploads. 6. Employ network segmentation to limit the appliance’s access to critical internal systems and data. 7. Educate IT and security teams about this vulnerability to ensure rapid detection and response to any exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.586Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691df24bcb9b476b7d51eae9

Added to database: 11/19/2025, 4:37:31 PM

Last enriched: 11/26/2025, 5:05:04 PM

Last updated: 1/7/2026, 4:53:50 AM

Views: 86

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats