A path traversal vulnerability exists in the Karel IP1211 IP Phone's web management panel. The /cgi-bin/cgiServer.exx endpoint fails to properly sanitize user input to the page parameter, allowing remote authenticated attackers to access arbitrary files on the underlying system by using crafted path traversal sequences (e.g., ../../). This can expose sensitive files such as /etc/passwd and /etc/shadow.
History

Mon, 23 Jun 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Jun 2025 19:00:00 +0000

Type Values Removed Values Added
Description A path traversal vulnerability exists in the Karel IP1211 IP Phone's web management panel. The /cgi-bin/cgiServer.exx endpoint fails to properly sanitize user input to the page parameter, allowing remote authenticated attackers to access arbitrary files on the underlying system by using crafted path traversal sequences (e.g., ../../). This can expose sensitive files such as /etc/passwd and /etc/shadow.
Title Karel IP Phone IP1211 Path Traversal
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-06-20T18:37:45.496Z

Updated: 2025-06-23T20:38:18.215Z

Reserved: 2025-04-15T19:15:22.545Z

Link: CVE-2025-34023

cve-icon Vulnrichment

Updated: 2025-06-23T20:38:12.238Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-20T19:15:36.887

Modified: 2025-06-23T20:16:21.633

Link: CVE-2025-34023

cve-icon Redhat

No data.