Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34330: CWE-434 Unrestricted Upload of File with Dangerous Type in AudioCodes Limited AudioCodes Fax/IVR Appliance

0
Medium
VulnerabilityCVE-2025-34330cvecve-2025-34330cwe-434
Published: Wed Nov 19 2025 (11/19/2025, 16:22:02 UTC)
Source: CVE Database V5
Vendor/Project: AudioCodes Limited
Product: AudioCodes Fax/IVR Appliance

Description

AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to and including 2.6.23 include a web administration component (F2MAdmin) that exposes an unauthenticated prompt upload endpoint at AudioCodes_files/utils/IVR/diagram/ajaxPromptUploadFile.php. The script accepts an uploaded file and writes it into the C:\\F2MAdmin\\tmp directory using a filename derived from application constants, without any authentication, authorization, or file-type validation. A remote, unauthenticated attacker can upload or overwrite prompt- or music-on-hold–related files in this directory, potentially leading to tampering with IVR audio content or preparing files for use in further attacks.

AI-Powered Analysis

AILast updated: 11/26/2025, 17:05:36 UTC

Technical Analysis

CVE-2025-34330 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting AudioCodes Fax Server and Auto-Attendant IVR appliances up to version 2.6.23. The issue resides in the F2MAdmin web administration component, specifically in the ajaxPromptUploadFile.php script located at AudioCodes_files/utils/IVR/diagram/. This script exposes an unauthenticated file upload endpoint that accepts files and writes them directly into the C:\F2MAdmin\tmp directory. The filename is derived from application constants but lacks any authentication, authorization, or file-type validation, allowing remote attackers to upload arbitrary files. Because the upload endpoint does not require user interaction or credentials, exploitation is straightforward over the network. Attackers can overwrite prompt or music-on-hold audio files, potentially altering IVR behavior or embedding malicious payloads for subsequent attacks. Although no exploits are currently known in the wild, the vulnerability poses a risk to the integrity and availability of IVR services. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N) reflects network attack vector, low complexity, no authentication, no user interaction, and limited impact on confidentiality but moderate impact on integrity. The vulnerability affects a niche but critical product used in telephony environments, making it a significant concern for organizations relying on AudioCodes appliances for voice communications.

Potential Impact

For European organizations, the impact of CVE-2025-34330 can be significant, particularly for those in telecommunications, contact centers, and enterprises using AudioCodes Fax Server and IVR appliances. Successful exploitation can lead to unauthorized modification of IVR prompts and music-on-hold files, potentially causing misinformation, disruption of customer interactions, or reputational damage. Furthermore, attackers might leverage the ability to upload arbitrary files to stage further attacks, such as deploying malware or establishing persistence within the telephony infrastructure. This could lead to service degradation or denial, impacting business continuity. Given the critical role of IVR systems in customer service and communication workflows, any compromise could disrupt operations and customer trust. Additionally, regulatory compliance risks may arise if altered IVR content leads to misinformation or breaches of communication standards. The lack of authentication and file validation increases the attack surface, making remote exploitation feasible without insider access or user interaction.

Mitigation Recommendations

To mitigate CVE-2025-34330, organizations should implement the following specific measures: 1) Immediately restrict network access to the F2MAdmin web administration interface by isolating it within secure management VLANs or VPNs, limiting exposure to trusted administrators only. 2) Employ network-level controls such as firewalls and intrusion prevention systems to block unauthorized access to the vulnerable upload endpoint. 3) Monitor the C:\F2MAdmin\tmp directory and related IVR prompt directories for unauthorized file changes using file integrity monitoring tools. 4) Implement application-layer controls if possible, such as web application firewalls (WAFs), to detect and block suspicious file upload attempts targeting ajaxPromptUploadFile.php. 5) Coordinate with AudioCodes for timely patching or firmware updates addressing this vulnerability; apply patches as soon as they become available. 6) Conduct regular security audits and penetration testing focused on telephony infrastructure to identify and remediate similar weaknesses. 7) Educate administrators on the risks of exposing management interfaces and enforce strong access controls and logging. 8) Consider deploying endpoint protection on the appliance if supported to detect malicious files or behaviors. These targeted actions go beyond generic advice by focusing on network segmentation, monitoring, and proactive controls specific to the vulnerable component and its operational context.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.586Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691df24bcb9b476b7d51eaf5

Added to database: 11/19/2025, 4:37:31 PM

Last enriched: 11/26/2025, 5:05:36 PM

Last updated: 1/7/2026, 4:53:54 AM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats