AudioCodes Fax Server and Auto-Attendant IVR appliances...
Critical severity
Unreviewed
Published
Nov 19, 2025
to the GitHub Advisory Database
•
Updated Nov 19, 2025
Description
Published by the National Vulnerability Database
Nov 19, 2025
Published to the GitHub Advisory Database
Nov 19, 2025
Last updated
Nov 19, 2025
AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to and including 2.6.23 include a web administration component (F2MAdmin) that exposes an unauthenticated script-management endpoint at AudioCodes_files/utils/IVR/diagram/ajaxScript.php. The saveScript action writes attacker-supplied data directly to a server-side file path under the privileges of the web service account, which runs as NT AUTHORITY\SYSTEM on Windows deployments. A remote, unauthenticated attacker can write arbitrary files into the product’s web-accessible directory structure and subsequently execute them.
References