phicomm CVE Vulnerabilities & Metrics

Focus on phicomm vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About phicomm Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with phicomm. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total phicomm CVEs: 18
Earliest CVE date: 20 Jul 2017, 22:29 UTC
Latest CVE date: 25 Aug 2023, 16:15 UTC

Latest CVE reference: CVE-2023-40796

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical phicomm CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.3

Max CVSS: 9.3

Critical CVEs (≥9): 3

CVSS Range vs. Count

Range Count
0.0-3.9 10
4.0-6.9 3
7.0-8.9 2
9.0-10.0 3

CVSS Distribution Chart

Top 5 Highest CVSS phicomm CVEs

These are the five CVEs with the highest CVSS scores for phicomm, sorted by severity first and recency.

All CVEs for phicomm

CVE-2023-40796 phicomm vulnerability CVSS: 0 25 Aug 2023, 16:15 UTC

Phicomm k2 v22.6.529.216 was discovered to contain a command injection vulnerability via the function luci.sys.call.

CVE-2022-48073 phicomm vulnerability CVSS: 0 27 Jan 2023, 15:15 UTC

Phicomm K2G v22.6.3.20 was discovered to store the root and admin passwords in plaintext.

CVE-2022-48072 phicomm vulnerability CVSS: 0 27 Jan 2023, 15:15 UTC

Phicomm K2G v22.6.3.20 was discovered to contain a command injection vulnerability via the autoUpTime parameter in the automatic upgrade function.

CVE-2022-48071 phicomm vulnerability CVSS: 0 27 Jan 2023, 15:15 UTC

Phicomm K2 v22.6.534.263 was discovered to store the root and admin passwords in plaintext.

CVE-2022-48070 phicomm vulnerability CVSS: 0 27 Jan 2023, 15:15 UTC

Phicomm K2 v22.6.534.263 was discovered to contain a command injection vulnerability via the autoUpTime parameter in the automatic upgrade function.

CVE-2022-37779 phicomm vulnerability CVSS: 0 08 Sep 2022, 00:15 UTC

Phicomm FIR151B A2, FIR302E A2, FIR300B A2, FIR303B A2 routers V3.0.1.17 were discovered to contain a remote command execution (RCE) vulnerability via the sendnum parameter of the ping function.

CVE-2022-37778 phicomm vulnerability CVSS: 0 08 Sep 2022, 00:15 UTC

Phicomm FIR151B A2, FIR302E A2, FIR300B A2, FIR303B A2 routers V3.0.1.17 were discovered to contain a remote command execution (RCE) vulnerability via the current_time parameter of the time function.

CVE-2022-37777 phicomm vulnerability CVSS: 0 08 Sep 2022, 00:15 UTC

Phicomm FIR151B A2, FIR302E A2, FIR300B A2, FIR303B A2 routers 3.0.1.17 and earlier were discovered to contain a remote command execution (RCE) vulnerability via the trHops parameter of the tracert function.

CVE-2022-37780 phicomm vulnerability CVSS: 0 07 Sep 2022, 17:15 UTC

Phicomm FIR151B A2, FIR302E A2, FIR300B A2, FIR303B A2 routers V3.0.1.17 were discovered to contain a remote command execution (RCE) vulnerability via the pingAddr parameter of the tracert function.

CVE-2022-27373 phicomm vulnerability CVSS: 0 19 Jul 2022, 18:15 UTC

Shanghai Feixun Data Communication Technology Co., Ltd router fir302b A2 was discovered to contain a remote command execution (RCE) vulnerability via the Ping function.

CVE-2022-25219 phicomm vulnerability CVSS: 6.9 10 Mar 2022, 17:47 UTC

A null byte interaction error has been discovered in the code that the telnetd_startup daemon uses to construct a pair of ephemeral passwords that allow a user to spawn a telnet service on the router, and to ensure that the telnet service persists upon reboot. By means of a crafted exchange of UDP packets, an unauthenticated attacker on the local network can leverage this null byte interaction error in such a way as to make those ephemeral passwords predictable (with 1-in-94 odds). Since the attacker must manipulate data processed by the OpenSSL function RSA_public_decrypt(), successful exploitation of this vulnerability depends on the use of an unpadded RSA cipher (CVE-2022-25218).

CVE-2022-25218 phicomm vulnerability CVSS: 9.3 10 Mar 2022, 17:47 UTC

The use of the RSA algorithm without OAEP, or any other padding scheme, in telnetd_startup, allows an unauthenticated attacker on the local area network to achieve a significant degree of control over the "plaintext" to which an arbitrary blob of ciphertext will be decrypted by OpenSSL's RSA_public_decrypt() function. This weakness allows the attacker to manipulate the various iterations of the telnetd startup state machine and eventually obtain a root shell on the device, by means of an exchange of crafted UDP packets. In all versions but K2 22.5.9.163 and K3C 32.1.15.93 a successful attack also requires the exploitation of a null-byte interaction error (CVE-2022-25219).

CVE-2022-25217 phicomm vulnerability CVSS: 7.2 10 Mar 2022, 17:47 UTC

Use of a hard-coded cryptographic key pair by the telnetd_startup service allows an attacker on the local area network to obtain a root shell on the device over telnet. The builds of telnetd_startup included in the version 22.5.9.163 of the K2 firmware, and version 32.1.15.93 of the K3C firmware (possibly amongst many other releases) included both the private and public RSA keys. The remaining versions cited here redacted the private key, but left the public key unchanged. An attacker in possession of the leaked private key may, through a scripted exchange of UDP packets, instruct telnetd_startup to spawn an unauthenticated telnet shell as root, by means of which they can then obtain complete control of the device. A consequence of the limited availablility of firmware images for testing is that models and versions not listed here may share this vulnerability.

CVE-2022-25215 phicomm vulnerability CVSS: 5.0 10 Mar 2022, 17:47 UTC

Improper access control on the LocalMACConfig.asp interface allows an unauthenticated remote attacker to add (or remove) client MAC addresses to (or from) a list of banned hosts. Clients with those MAC addresses are then prevented from accessing either the WAN or the router itself.

CVE-2022-25214 phicomm vulnerability CVSS: 5.8 10 Mar 2022, 17:47 UTC

Improper access control on the LocalClientList.asp interface allows an unauthenticated remote attacker to obtain sensitive information concerning devices on the local area network, including IP and MAC addresses. Improper access control on the wirelesssetup.asp interface allows an unauthenticated remote attacker to obtain the WPA passphrases for the 2.4GHz and 5.0GHz wireless networks. This is particularly dangerous given that the K2G setup wizard presents the user with the option of using the same password for the 2.4Ghz network and the administrative interface, by clicking a checkbox. When Remote Managment is enabled, these endpoints are exposed to the WAN.

CVE-2022-25213 phicomm vulnerability CVSS: 7.2 10 Mar 2022, 17:47 UTC

Improper physical access control and use of hard-coded credentials in /etc/passwd permits an attacker with physical access to obtain a root shell via an unprotected UART port on the device. The same port exposes an unauthenticated Das U-Boot BIOS shell.

CVE-2019-19117 phicomm vulnerability CVSS: 9.0 18 Nov 2019, 22:15 UTC

/usr/lib/lua/luci/controller/admin/autoupgrade.lua on PHICOMM K2(PSG1218) V22.5.9.163 devices allows remote authenticated users to execute any command via shell metacharacters in the cgi-bin/luci autoUpTime parameter.

CVE-2017-11495 phicomm vulnerability CVSS: 9.0 20 Jul 2017, 22:29 UTC

PHICOMM K2(PSG1218) devices V22.5.11.5 and earlier allow unauthenticated remote code execution via a request to an unspecified ASP script; alternatively, the attacker can leverage unauthenticated access to this script to trigger a reboot via an ifType=reboot action.