CVE-2025-64056: n/a
File upload vulnerability in Fanvil x210 V2 2.12.20 allows unauthenticated attackers on the local network to store arbitrary files on the filesystem.
AI Analysis
Technical Summary
CVE-2025-64056 identifies a file upload vulnerability in the Fanvil x210 V2 IP phone, specifically version 2.12.20. This vulnerability allows unauthenticated attackers who have access to the local network to upload arbitrary files to the device's filesystem. The flaw stems from insufficient access control (CWE-306), permitting attackers to bypass authentication requirements and write files without user interaction. While the vulnerability does not directly compromise confidentiality or availability, it impacts integrity by enabling unauthorized file storage, which could be leveraged for malicious payloads, configuration tampering, or establishing persistence on the device. The CVSS score of 4.3 reflects its medium severity, considering the attack vector is local network (AV:A), no privileges required (PR:N), no user interaction (UI:N), and the impact is limited to integrity (I:L) without affecting confidentiality or availability. No patches or known exploits are currently available, indicating that vendors and users should prioritize risk mitigation. The vulnerability affects a specific firmware version, but exact affected versions beyond 2.12.20 are not detailed. Given the device's role in enterprise telephony, exploitation could facilitate lateral movement or further compromise within corporate networks.
Potential Impact
For European organizations, the impact primarily concerns the integrity of VoIP infrastructure. Unauthorized file uploads could allow attackers to implant malicious scripts or configuration files, potentially disrupting telephony services or enabling eavesdropping and call interception. While the vulnerability requires local network access, many enterprises have IP phones on segmented voice VLANs, which could be targeted if network segmentation is weak. Disruption or compromise of telephony systems can affect business communications, customer service, and operational continuity. Additionally, compromised devices could serve as footholds for broader network intrusions. The medium severity suggests moderate risk, but organizations with critical communications infrastructure relying on Fanvil devices should treat this as a significant concern. The absence of known exploits reduces immediate risk but also means attackers may develop exploits in the future.
Mitigation Recommendations
1. Implement strict network segmentation to isolate VoIP devices on dedicated VLANs with controlled access, limiting exposure to untrusted local network users. 2. Monitor network traffic for unusual file upload attempts or anomalous behavior on Fanvil x210 V2 devices. 3. Restrict physical and network access to the devices to trusted personnel only. 4. Regularly audit device configurations and filesystem contents for unauthorized changes. 5. Engage with Fanvil support to obtain firmware updates or patches addressing this vulnerability as soon as they become available. 6. Employ intrusion detection systems (IDS) tailored to detect suspicious activity on VoIP devices. 7. Consider temporary disabling of file upload features if feasible until patches are released. 8. Educate IT staff about the vulnerability and ensure incident response plans include scenarios involving VoIP device compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-64056: n/a
Description
File upload vulnerability in Fanvil x210 V2 2.12.20 allows unauthenticated attackers on the local network to store arbitrary files on the filesystem.
AI-Powered Analysis
Technical Analysis
CVE-2025-64056 identifies a file upload vulnerability in the Fanvil x210 V2 IP phone, specifically version 2.12.20. This vulnerability allows unauthenticated attackers who have access to the local network to upload arbitrary files to the device's filesystem. The flaw stems from insufficient access control (CWE-306), permitting attackers to bypass authentication requirements and write files without user interaction. While the vulnerability does not directly compromise confidentiality or availability, it impacts integrity by enabling unauthorized file storage, which could be leveraged for malicious payloads, configuration tampering, or establishing persistence on the device. The CVSS score of 4.3 reflects its medium severity, considering the attack vector is local network (AV:A), no privileges required (PR:N), no user interaction (UI:N), and the impact is limited to integrity (I:L) without affecting confidentiality or availability. No patches or known exploits are currently available, indicating that vendors and users should prioritize risk mitigation. The vulnerability affects a specific firmware version, but exact affected versions beyond 2.12.20 are not detailed. Given the device's role in enterprise telephony, exploitation could facilitate lateral movement or further compromise within corporate networks.
Potential Impact
For European organizations, the impact primarily concerns the integrity of VoIP infrastructure. Unauthorized file uploads could allow attackers to implant malicious scripts or configuration files, potentially disrupting telephony services or enabling eavesdropping and call interception. While the vulnerability requires local network access, many enterprises have IP phones on segmented voice VLANs, which could be targeted if network segmentation is weak. Disruption or compromise of telephony systems can affect business communications, customer service, and operational continuity. Additionally, compromised devices could serve as footholds for broader network intrusions. The medium severity suggests moderate risk, but organizations with critical communications infrastructure relying on Fanvil devices should treat this as a significant concern. The absence of known exploits reduces immediate risk but also means attackers may develop exploits in the future.
Mitigation Recommendations
1. Implement strict network segmentation to isolate VoIP devices on dedicated VLANs with controlled access, limiting exposure to untrusted local network users. 2. Monitor network traffic for unusual file upload attempts or anomalous behavior on Fanvil x210 V2 devices. 3. Restrict physical and network access to the devices to trusted personnel only. 4. Regularly audit device configurations and filesystem contents for unauthorized changes. 5. Engage with Fanvil support to obtain firmware updates or patches addressing this vulnerability as soon as they become available. 6. Employ intrusion detection systems (IDS) tailored to detect suspicious activity on VoIP devices. 7. Consider temporary disabling of file upload features if feasible until patches are released. 8. Educate IT staff about the vulnerability and ensure incident response plans include scenarios involving VoIP device compromise.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-10-27T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6932faa1f88dbe026cf03a58
Added to database: 12/5/2025, 3:30:41 PM
Last enriched: 12/12/2025, 4:27:16 PM
Last updated: 2/7/2026, 1:55:23 AM
Views: 47
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.