Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64056: n/a

0
Medium
VulnerabilityCVE-2025-64056cvecve-2025-64056
Published: Fri Dec 05 2025 (12/05/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

File upload vulnerability in Fanvil x210 V2 2.12.20 allows unauthenticated attackers on the local network to store arbitrary files on the filesystem.

AI-Powered Analysis

AILast updated: 12/12/2025, 16:27:16 UTC

Technical Analysis

CVE-2025-64056 identifies a file upload vulnerability in the Fanvil x210 V2 IP phone, specifically version 2.12.20. This vulnerability allows unauthenticated attackers who have access to the local network to upload arbitrary files to the device's filesystem. The flaw stems from insufficient access control (CWE-306), permitting attackers to bypass authentication requirements and write files without user interaction. While the vulnerability does not directly compromise confidentiality or availability, it impacts integrity by enabling unauthorized file storage, which could be leveraged for malicious payloads, configuration tampering, or establishing persistence on the device. The CVSS score of 4.3 reflects its medium severity, considering the attack vector is local network (AV:A), no privileges required (PR:N), no user interaction (UI:N), and the impact is limited to integrity (I:L) without affecting confidentiality or availability. No patches or known exploits are currently available, indicating that vendors and users should prioritize risk mitigation. The vulnerability affects a specific firmware version, but exact affected versions beyond 2.12.20 are not detailed. Given the device's role in enterprise telephony, exploitation could facilitate lateral movement or further compromise within corporate networks.

Potential Impact

For European organizations, the impact primarily concerns the integrity of VoIP infrastructure. Unauthorized file uploads could allow attackers to implant malicious scripts or configuration files, potentially disrupting telephony services or enabling eavesdropping and call interception. While the vulnerability requires local network access, many enterprises have IP phones on segmented voice VLANs, which could be targeted if network segmentation is weak. Disruption or compromise of telephony systems can affect business communications, customer service, and operational continuity. Additionally, compromised devices could serve as footholds for broader network intrusions. The medium severity suggests moderate risk, but organizations with critical communications infrastructure relying on Fanvil devices should treat this as a significant concern. The absence of known exploits reduces immediate risk but also means attackers may develop exploits in the future.

Mitigation Recommendations

1. Implement strict network segmentation to isolate VoIP devices on dedicated VLANs with controlled access, limiting exposure to untrusted local network users. 2. Monitor network traffic for unusual file upload attempts or anomalous behavior on Fanvil x210 V2 devices. 3. Restrict physical and network access to the devices to trusted personnel only. 4. Regularly audit device configurations and filesystem contents for unauthorized changes. 5. Engage with Fanvil support to obtain firmware updates or patches addressing this vulnerability as soon as they become available. 6. Employ intrusion detection systems (IDS) tailored to detect suspicious activity on VoIP devices. 7. Consider temporary disabling of file upload features if feasible until patches are released. 8. Educate IT staff about the vulnerability and ensure incident response plans include scenarios involving VoIP device compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6932faa1f88dbe026cf03a58

Added to database: 12/5/2025, 3:30:41 PM

Last enriched: 12/12/2025, 4:27:16 PM

Last updated: 2/7/2026, 1:55:23 AM

Views: 47

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats