CVE-2025-14577

9.8 CRITICAL

📋 TL;DR

Slican NCP/IPL/IPM/IPU devices contain a PHP function injection vulnerability in the /webcti/session_ajax.php endpoint. Unauthenticated remote attackers can execute arbitrary PHP commands, potentially leading to complete system compromise. This affects all unpatched Slican NCP, IPL, IPM, and IPU devices.

💻 Affected Systems

Products:
  • Slican NCP
  • Slican IPL
  • Slican IPM
  • Slican IPU
Versions: All versions before 1.24.0190 (NCP) and 6.61.0010 (IPL/IPM/IPU)
Operating Systems: Embedded systems running Slican firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. The /webcti/session_ajax.php endpoint is accessible without authentication.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover, data exfiltration, ransomware deployment, and use as pivot point for network attacks

🟠

Likely Case

Remote code execution leading to device compromise, credential theft, and lateral movement

🟢

If Mitigated

Limited impact if device is isolated, patched, or has network controls blocking external access

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation allows attackers to compromise devices directly from the internet
🏢 Internal Only: HIGH - Even internally, unauthenticated exploitation allows attackers with network access to compromise devices

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires sending specially crafted HTTP requests to a specific endpoint. No authentication is required, making exploitation straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.24.0190 for NCP, 6.61.0010 for IPL/IPM/IPU

Vendor Advisory: https://www.slican.pl/oferta/centrale-telefoniczne/

Restart Required: Yes

Instructions:

1. Download latest firmware from Slican vendor portal. 2. Backup current configuration. 3. Upload and apply firmware update. 4. Reboot device. 5. Verify version matches patched release.

🔧 Temporary Workarounds

Network Access Control

all

Block external access to affected devices and restrict internal access to authorized networks only

Web Application Firewall

all

Deploy WAF rules to block requests to /webcti/session_ajax.php containing PHP function injection patterns

🧯 If You Can't Patch

  • Isolate affected devices in separate VLAN with strict firewall rules allowing only necessary traffic
  • Implement network segmentation and monitor all traffic to/from affected devices for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check device web interface or CLI for firmware version. If version is below 1.24.0190 (NCP) or 6.61.0010 (IPL/IPM/IPU), device is vulnerable.

Check Version:

Check via web interface at System > Information or via device-specific CLI commands

Verify Fix Applied:

Confirm firmware version matches patched release and test that /webcti/session_ajax.php endpoint no longer accepts PHP function injection payloads

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /webcti/session_ajax.php with PHP function patterns
  • Unusual process execution from web server context
  • Failed authentication attempts followed by successful session_ajax.php access

Network Indicators:

  • HTTP POST requests to /webcti/session_ajax.php containing eval(), system(), exec(), or passthru() patterns
  • Outbound connections from device to unknown external IPs

SIEM Query:

source="web_logs" AND uri="/webcti/session_ajax.php" AND (body="eval(" OR body="system(" OR body="exec(" OR body="passthru(")

🔗 References

📤 Share & Export