CVE-2012-4869

EXPLOITED IN THE WILD

FreePBX <2.10 - Command Injection

Title source: llm

Description

The callme_startcall function in recordings/misc/callme_page.php in FreePBX 2.9, 2.10, and earlier allows remote attackers to execute arbitrary commands via the callmenum parameter in a c action.

Exploits (5)

nomisec WORKING POC
by cyberdesu · remote
https://github.com/cyberdesu/Elastix-2.2.0-CVE-2012-4869
metasploit WORKING POC MANUAL
by muts, Martin Tschirsich · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/http/freepbx_callmenum.rb
exploitdb WORKING POC VERIFIED
by muts · pythonwebappsphp
https://www.exploit-db.com/exploits/18650
exploitdb WORKING POC VERIFIED
by Martin Tschirsich · textwebappsphp
https://www.exploit-db.com/exploits/18649
exploitdb WORKING POC VERIFIED
by Metasploit · rubywebappsphp
https://www.exploit-db.com/exploits/18659

Scores

EPSS 0.8623
EPSS Percentile 99.4%

Exploitation Intel

VulnCheck KEV 2020-12-01
InTheWild.io 2023-02-15

Classification

CWE
CWE-94
Status draft

Affected Products (2)

sangoma/freepbx < 2.10
sangoma/freepbx

Timeline

Published Sep 06, 2012
Tracked Since Feb 18, 2026