Vulnerabilities > Akuvox
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-03-13 | CVE-2023-0353 | Unspecified vulnerability in Akuvox E11 Firmware Akuvox E11 uses a weak encryption algorithm for stored passwords and uses a hard-coded password for decryption which could allow the encrypted passwords to be decrypted from the configuration file. | 9.8 |
2023-03-13 | CVE-2023-0354 | Unspecified vulnerability in Akuvox E11 Firmware The Akuvox E11 web server can be accessed without any user authentication, and this could allow an attacker to access sensitive information, as well as create and download packet captures with known default URLs. | 9.1 |
2023-03-13 | CVE-2023-0355 | Unspecified vulnerability in Akuvox E11 Firmware Akuvox E11 uses a hard-coded cryptographic key, which could allow an attacker to decrypt sensitive information. | 7.5 |
2021-04-25 | CVE-2021-31726 | Command Injection vulnerability in Akuvox C315 Firmware 115.116.2613 Akuvox C315 115.116.2613 allows remote command Injection via the cfgd_server service. | 7.5 |
2019-07-22 | CVE-2019-12327 | Use of Hard-coded Credentials vulnerability in Akuvox Sp-R50P Firmware 50.0.6.156 Hardcoded credentials in the Akuvox R50P VoIP phone 50.0.6.156 allow an attacker to get access to the device via telnet. | 10.0 |
2019-07-22 | CVE-2019-12326 | Unrestricted Upload of File with Dangerous Type vulnerability in Akuvox Sp-R50P Firmware 50.0.6.156 Missing file and path validation in the ringtone upload function of the Akuvox R50P VoIP phone 50.0.6.156 allows an attacker to upload a manipulated ringtone file, with an executable payload (shell commands within the file) and trigger code execution. | 10.0 |
2019-07-22 | CVE-2019-12324 | OS Command Injection vulnerability in Akuvox Sp-R50P Firmware 50.0.6.156 A command injection (missing input validation) issue in the IP address field for the logging server in the configuration web interface on the Akuvox R50P VoIP phone with firmware 50.0.6.156 allows an authenticated remote attacker in the same network to trigger OS commands via shell metacharacters in a POST request. | 9.0 |