### [CVE-2023-20126](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20126) ![](https://img.shields.io/static/v1?label=Product&message=Cisco%20Small%20Business%20IP%20Phones%20&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-306&color=brighgreen) ### Description A vulnerability in the web-based management interface of Cisco SPA112 2-Port Phone Adapters could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device. This vulnerability is due to a missing authentication process within the firmware upgrade function. An attacker could exploit this vulnerability by upgrading an affected device to a crafted version of firmware. A successful exploit could allow the attacker to execute arbitrary code on the affected device with full privileges. Cisco has not released firmware updates to address this vulnerability. ### POC #### Reference No PoCs from references. #### Github - https://github.com/fullspectrumdev/RancidCrisco - https://github.com/nomi-sec/PoC-in-GitHub