CVE-2025-34023
HIGH EXPLOITED NUCLEIKarel IP1211 - Path Traversal
Title source: llmDescription
A path traversal vulnerability exists in the Karel IP1211 IP Phone's web management panel. The /cgi-bin/cgiServer.exx endpoint fails to properly sanitize user input to the page parameter, allowing remote authenticated attackers to access arbitrary files on the underlying system by using crafted path traversal sequences. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-02 UTC.
Exploits (1)
exploitdb
WORKING POC
by berat isler · textwebappshardware
https://www.exploit-db.com/exploits/48857
Nuclei Templates (1)
Karel IP Phone IP1211 Web Management Panel - Local File Inclusion
HIGHby 0x_Akoko
References (4)
Scores
CVSS v4
8.5
EPSS
0.0277
EPSS Percentile
86.1%
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H
Details
VulnCheck KEV
2025-06-20
CWE
CWE-22
Status
published
Products (1)
Karel/Karel IP Phone IP1211
Published
Jun 20, 2025
Tracked Since
Feb 18, 2026