7.5
CVSSv2

CVE-2021-30461

Published: 29/05/2021 Updated: 09/06/2021
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

A remote code execution issue exists in the web UI of VoIPmonitor prior to 24.61. When the recheck option is used, the user-supplied SPOOLDIR value (which might contain PHP code) is injected into config/configuration.php.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

voipmonitor voipmonitor

Github Repositories

Impacted Products VoIPmonitor < 2460 How to RCE python3 CVE-2021-30461py -t ip_address Browser shell: xxxx/namrlblgelphp?a=whoami Reference ssd-disclosurecom/ssd-advisory-voipmonitor-unauth-rce/

VOIP RCE

CVE-2021-30461 VOIP RCE Technical details ssd-disclosurecom/ssd-advisory-voipmonitor-unauth-rce/ YouTube : wwwyoutubecom/watch?v=9V_BI6Lq-Rw Follow us Vulnmachines YouTube Twitter Facebook LinkedIn

CVE-2021-30461

Impacted Products VoIPmonitor < 2460 How to RCE python3 CVE-2021-30461py -t ip_address Browser shell: xxxx/namrlblgelphp?a=whoami Reference ssd-disclosurecom/ssd-advisory-voipmonitor-unauth-rce/