CVE-2025-34023
Karel IP Phone IP1211 Path Traversal
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
A path traversal vulnerability exists in the Karel IP1211 IP Phone's web management panel. The /cgi-bin/cgiServer.exx endpoint fails to properly sanitize user input to the page parameter, allowing remote authenticated attackers to access arbitrary files on the underlying system by using crafted path traversal sequences. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-02 UTC.
| CWE | CWE-22 |
| Vendor | karel |
| Product | karel ip phone ip1211 |
| Published | Jun 20, 2025 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for karel karel ip phone ip1211
Be the first to know when new unknown vulnerabilities affecting karel karel ip phone ip1211 are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Karel / Karel IP Phone IP1211
All versions affected References
web.archive.org: https://web.archive.org/web/20201020023943/https://www.karel.com.tr/urun-cozum/ip1211-ip-telefon cxsecurity.com: https://cxsecurity.com/issue/WLB-2020100038 exploit-db.com: https://www.exploit-db.com/exploits/48857 vulncheck.com: https://vulncheck.com/advisories/selea-targa-ip-camera-path-traversal
Credits
Berat Gokberk Isler