📦 E11 Firmware
by Akuvox
🔍 What is E11 Firmware?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
Akuvox E11 devices use a custom Dropbear SSH server with an insecure option not present in official versions, potentially allowing unauthorized access. This affects Akuvox E11 devices running vulnerab...
The Akuvox E11 device has SSH enabled by default with a hardcoded root password that cannot be changed. This allows attackers to gain full administrative control over affected devices. Organizations u...
The Akuvox E11 password recovery webpage is accessible without authentication, allowing attackers to download the device key file and reset the password to default. This affects users of Akuvox E11 de...
The Akuvox E11 web server lacks authentication controls, allowing unauthenticated attackers to access sensitive information and create/download packet captures via default URLs. This affects organizat...
This vulnerability allows attackers to identify Akuvox E11 devices on the Akuvox cloud by combining MAC and IP addresses. This affects organizations using Akuvox E11 devices connected to the Akuvox cl...
The Akuvox E11's libvoice library has an authentication bypass vulnerability that allows unauthenticated access to camera capture functionality. Attackers can remotely view and record images/videos fr...
This vulnerability allows remote command injection in Akuvox E11 devices through the phone-book contacts functionality. Attackers can upload files containing executable commands, potentially gaining f...