CrowdSec
10/10CrowdSec Score

Mitel - RCE (CVE-2025-47188)

Published on07-08-2025
First seen on08-01-2026
Public ExploitCVSS 6.5/10Mitel - Mitel

6Exploiting IPs reported

A vulnerability in the Mitel 6800 Series, 6900 Series, and 6900w Series SIP Phones through 6.4 SP4 (R6.4.0.4006), and the 6970 Conference Unit through 6.4 SP4 (R6.4.0.4006) or version V1 R0.1.0, could allow an unauthenticated attacker to conduct a command injection attack due to insufficient parameter sanitization. A successful exploit could allow an attacker to execute arbitrary commands within the context of the phone, leading to disclosure or modification of sensitive configuration data or affecting device availability and operation.

CrowdSec analysis

CVE-2025-47188 is a command injection vulnerability in Mitel 6800, 6900, 6900w Series SIP Phones, and the 6970 Conference Unit, allowing unauthenticated attackers to execute arbitrary commands due to improper parameter sanitization. Exploitation of this flaw could lead to unauthorized disclosure or modification of sensitive configuration data, potentially impacting device operation and security.

CrowdSec has been tracking this vulnerability and its exploits since 29th of December 2025.

Data from the CrowdSec community indicates that exploitation of CVE-2025-47188 is highly selective and intelligence-driven. Threat actors use advanced reconnaissance and carefully choose their targets, often as part of sophisticated campaigns or advanced persistent threat operations. Additionally, according to week-over-week analysis by CrowdSec, exploitation of CVE-2025-47188 is surging. Attack volumes are spiking well above historical norms, indicating widespread and escalating interest from threat actors. CVE-2025-47188 is currently experiencing high visibility and active exploitation across the internet.

Attackers exploit the /cgi-bin/webconfig endpoint with parameters like page=upload_ringtone and action=submit to upload malicious files and inject OS commands, targeting Mitel SIP phones and conference units.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.