Vulnerabilities
Vulnerable Software
Akuvox:  Security Vulnerabilities
Akuvox E11 uses a weak encryption algorithm for stored passwords and uses a hard-coded password for decryption which could allow the encrypted passwords to be decrypted from the configuration file.
CVSS Score
7.2
EPSS Score
0.001
Published
2023-03-13
The Akuvox E11 web server can be accessed without any user authentication, and this could allow an attacker to access sensitive information, as well as create and download packet captures with known default URLs.
CVSS Score
9.1
EPSS Score
0.002
Published
2023-03-13
Akuvox E11 uses a hard-coded cryptographic key, which could allow an attacker to decrypt sensitive information.
CVSS Score
6.5
EPSS Score
0.001
Published
2023-03-13
Akuvox C315 115.116.2613 allows remote command Injection via the cfgd_server service. The attack vector is sending a payload to port 189 (default root 0.0.0.0).
CVSS Score
9.8
EPSS Score
0.044
Published
2021-04-25
Hardcoded credentials in the Akuvox R50P VoIP phone 50.0.6.156 allow an attacker to get access to the device via telnet. The telnet service is running on port 2323; it cannot be turned off and the credentials cannot be changed.
CVSS Score
7.2
EPSS Score
0.008
Published
2019-07-22
Missing file and path validation in the ringtone upload function of the Akuvox R50P VoIP phone 50.0.6.156 allows an attacker to upload a manipulated ringtone file, with an executable payload (shell commands within the file) and trigger code execution.
CVSS Score
7.2
EPSS Score
0.016
Published
2019-07-22
A command injection (missing input validation) issue in the IP address field for the logging server in the configuration web interface on the Akuvox R50P VoIP phone with firmware 50.0.6.156 allows an authenticated remote attacker in the same network to trigger OS commands via shell metacharacters in a POST request.
CVSS Score
7.2
EPSS Score
0.151
Published
2019-07-22


Contact Us

Shodan ® - All rights reserved