CVE-2012-4869
EXPLOITED IN THE WILDFreePBX <2.10 - Command Injection
Title source: llmDescription
The callme_startcall function in recordings/misc/callme_page.php in FreePBX 2.9, 2.10, and earlier allows remote attackers to execute arbitrary commands via the callmenum parameter in a c action.
Exploits (5)
metasploit
WORKING POC
MANUAL
by muts, Martin Tschirsich · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/http/freepbx_callmenum.rb
exploitdb
WORKING POC
VERIFIED
by Martin Tschirsich · textwebappsphp
https://www.exploit-db.com/exploits/18649
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubywebappsphp
https://www.exploit-db.com/exploits/18659
References (8)
Scores
EPSS
0.8623
EPSS Percentile
99.4%
Exploitation Intel
VulnCheck KEV
2020-12-01
InTheWild.io
2023-02-15
Classification
CWE
CWE-94
Status
draft
Affected Products (2)
sangoma/freepbx
< 2.10
sangoma/freepbx
Timeline
Published
Sep 06, 2012
Tracked Since
Feb 18, 2026