A command injection (missing input validation, escaping) in the monitoring or memory status web interface in AudioCodes 405HD (firmware 2.2.12) VoIP phone allows an authenticated remote attacker in the same network as the device to trigger OS commands (like starting telnetd or opening a reverse shell) via a POST request to the web server. In combination with another attack (unauthenticated password change), the attacker can circumvent the authentication requirement.
References
Link | Resource |
---|---|
https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_AudioCodes_405HD.pdf | Mitigation Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-04-25T19:52:20
Updated: 2019-04-25T19:52:20
Reserved: 2018-08-30T00:00:00
Link: CVE-2018-16216
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-04-25T20:29:01.787
Modified: 2019-10-03T00:03:26.223
Link: CVE-2018-16216
JSON object: View
Redhat Information
No data.
CWE