Vulnerability Description
A command injection (missing input validation, escaping) in the monitoring or memory status web interface in AudioCodes 405HD (firmware 2.2.12) VoIP phone allows an authenticated remote attacker in the same network as the device to trigger OS commands (like starting telnetd or opening a reverse shell) via a POST request to the web server. In combination with another attack (unauthenticated password change), the attacker can circumvent the authentication requirement.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Audiocodes | 405Hd Firmware | 2.2.12 |
| Audiocodes | 405Hd | - |
Related Weaknesses (CWE)
References
- https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_AudioCodes_405HD.ExploitMitigationThird Party Advisory
- https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_AudioCodes_405HD.ExploitMitigationThird Party Advisory
FAQ
What is CVE-2018-16216?
CVE-2018-16216 is a vulnerability with a CVSS score of 8.0 (HIGH). A command injection (missing input validation, escaping) in the monitoring or memory status web interface in AudioCodes 405HD (firmware 2.2.12) VoIP phone allows an authenticated remote attacker in th...
How severe is CVE-2018-16216?
CVE-2018-16216 has been rated HIGH with a CVSS base score of 8.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-16216?
Check the references section above for vendor advisories and patch information. Affected products include: Audiocodes 405Hd Firmware, Audiocodes 405Hd.