AudioCodes Fax/IVR Appliance <= 2.6.23 Unauthenticated File Read via download.php
Description
AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to and including 2.6.23 contain an unauthenticated file read vulnerability via the download.php script. The endpoint exposes a file download mechanism that lacks access control, allowing remote, unauthenticated users to request files stored on the appliance based solely on attacker-supplied path and filename parameters. While limited to specific file extensions permitted by the application logic, sensitive backup archives can be retrieved, exposing internal databases and credential hashes. Successful exploitation may lead to disclosure of administrative password hashes and other sensitive configuration data.
Affected products
3- Range: <=2.6.23
- Range: <=2.6.23
- AudioCodes Limited/AudioCodes Fax/IVR Appliancev5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- pierrekim.github.io/advisories/2025-audiocodes-fax-ivr.txtmitretechnical-descriptionexploit
- pierrekim.github.io/blog/2025-11-20-audiocodes-fax-ivr-8-vulnerabilities.htmlmitretechnical-descriptionexploit
- www.audiocodes.com/media/g1in2u2o/0548-product-notice-end-of-service-for-audiocodes-auto-attendant-ivr-solution.pdfmitrevendor-advisorypatchmitigation
- www.vulncheck.com/advisories/audiocodes-fax-ivr-appliance-unauthenticated-file-read-via-downloadmitrethird-party-advisory
News mentions
0No linked articles in our index yet.