Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34330: CWE-434 Unrestricted Upload of File with Dangerous Type in AudioCodes Limited AudioCodes Fax/IVR Appliance

0
Medium
VulnerabilityCVE-2025-34330cvecve-2025-34330cwe-434
Published: Wed Nov 19 2025 (11/19/2025, 16:22:02 UTC)
Source: CVE Database V5
Vendor/Project: AudioCodes Limited
Product: AudioCodes Fax/IVR Appliance

Description

AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to and including 2.6.23 include a web administration component (F2MAdmin) that exposes an unauthenticated prompt upload endpoint at AudioCodes_files/utils/IVR/diagram/ajaxPromptUploadFile.php. The script accepts an uploaded file and writes it into the C:\\F2MAdmin\\tmp directory using a filename derived from application constants, without any authentication, authorization, or file-type validation. A remote, unauthenticated attacker can upload or overwrite prompt- or music-on-hold–related files in this directory, potentially leading to tampering with IVR audio content or preparing files for use in further attacks.

AI-Powered Analysis

AILast updated: 11/19/2025, 16:54:29 UTC

Technical Analysis

CVE-2025-34330 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting AudioCodes Fax Server and Auto-Attendant IVR appliances up to version 2.6.23. The issue resides in the web administration component named F2MAdmin, specifically in the ajaxPromptUploadFile.php script located at AudioCodes_files/utils/IVR/diagram/. This script exposes an unauthenticated file upload endpoint that accepts files from remote attackers without any authentication or authorization checks. Uploaded files are saved directly into the C:\F2MAdmin\tmp directory with filenames derived from application constants, but critically, there is no validation of the file type or content. This lack of restrictions allows attackers to upload or overwrite prompt or music-on-hold audio files used by the IVR system. By manipulating these files, attackers could alter IVR audio prompts, potentially misleading users or disrupting telephony services. Furthermore, the ability to upload arbitrary files might be leveraged to stage further attacks, such as placing malicious payloads for local execution or persistence if other vulnerabilities exist. The vulnerability has a CVSS 4.0 base score of 6.9, reflecting its network attack vector, no required privileges or user interaction, and low complexity, but limited impact on confidentiality and availability. No patches or known exploits are currently reported, but the exposed unauthenticated upload endpoint represents a significant attack surface in telephony infrastructure.

Potential Impact

For European organizations, this vulnerability poses risks primarily to the integrity and availability of telephony services. Unauthorized modification of IVR prompts or music-on-hold files can disrupt customer interactions, cause misinformation, or degrade service quality. In sectors relying heavily on telephony systems for customer support, such as finance, healthcare, and government, this could lead to operational disruptions and reputational damage. Additionally, if attackers leverage this vulnerability to stage further attacks, it could escalate into broader compromise of internal networks. Given the unauthenticated nature of the upload, attackers can exploit this remotely without prior access, increasing the threat level. The impact is particularly relevant for organizations using AudioCodes Fax/IVR appliances in their telephony infrastructure, which are widely deployed in Europe. Disruptions in critical communication systems could have cascading effects on business continuity and regulatory compliance, especially under GDPR and other data protection frameworks.

Mitigation Recommendations

European organizations should immediately audit their telephony infrastructure to identify affected AudioCodes Fax Server and Auto-Attendant IVR appliance versions (up to 2.6.23). Since no patches are currently available, implement compensating controls such as network segmentation to restrict access to the F2MAdmin web administration interface, allowing only trusted management hosts. Deploy web application firewalls (WAFs) or intrusion prevention systems (IPS) to detect and block unauthorized file upload attempts targeting ajaxPromptUploadFile.php. Monitor logs for unusual file upload activity or changes in the C:\F2MAdmin\tmp directory. Consider disabling or restricting the web administration component if not essential. Engage with AudioCodes support for updates or patches and apply them promptly once released. Additionally, implement strict access controls and multi-factor authentication for telephony management interfaces to prevent unauthorized access. Conduct regular security assessments and penetration tests focusing on telephony systems to detect similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.586Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691df24bcb9b476b7d51eaf5

Added to database: 11/19/2025, 4:37:31 PM

Last enriched: 11/19/2025, 4:54:29 PM

Last updated: 11/21/2025, 3:03:52 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats