CVE-2025-34335
BaseFortify
Publication date: 2025-11-19
Last updated on: 2025-12-11
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| audiocodes | fax_server | to 2.6.23 (inc) |
| audiocodes | interactive_voice_response | to 2.6.23 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in AudioCodes Fax Server and Auto-Attendant IVR appliances up to version 2.6.23. It is an authenticated command injection flaw in the license activation process. When a license file is uploaded, the system constructs a command line using the uploaded file's extension without proper validation or escaping. An authenticated user can craft a filename with a malicious extension that injects shell commands, which are then executed with NT AUTHORITY\SYSTEM privileges, allowing arbitrary command execution on the system.
How can this vulnerability impact me? :
This vulnerability can allow an authenticated attacker to execute arbitrary commands on the affected system with the highest system privileges (NT AUTHORITY\SYSTEM). This can lead to full system compromise, unauthorized access to sensitive data, disruption of services, installation of malware, or further attacks within the network.