Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»900 Sangoma FreePBX Instances Infected With Web Shells
    Cybersecurity

    900 Sangoma FreePBX Instances Infected With Web Shells

    adminBy adminFebruary 28, 2026No Comments2 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Vulnerability exploited
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Approximately 900 Sangoma FreePBX instances remain infected with web shells in attacks that exploited a command injection vulnerability starting December 2025.

    Sangoma FreePBX is a web-based, open source graphical user interface that serves as a widely deployed management tool for Asterisk-based IP telephone systems.

    The exploited bug, tracked as CVE-2025-64328 (CVSS score of 8.6) and patched in November 2025, impacts the filestore module of the endpoint manager’s administrative interface.

    Described as a post-authentication command injection issue, the flaw allows an attacker logged in as any user with access to the interface to execute arbitrary shell commands on the underlying host and gain remote access to the system.

    Last month, Fortinet revealed that a hacking group tracked as INJ3CTOR3 had been exploiting CVE-2025-64328 for over a month to deploy a web shell called EncystPHP.

    The web shell provides the attackers with remote command execution, persistent access, and web shell deployment capabilities.

    Advertisement. Scroll to continue reading.

    “These incidents begin with the exploitation of a FreePBX vulnerability, followed by the deployment of a PHP web shell in the target environments. We assess that this campaign represents recent attack activity and behavior patterns associated with INJ3CTOR3,” Fortinet said.

    A week later, the US cybersecurity agency CISA added the CVE to its Known Exploited Vulnerabilities (KEV) list alongside CVE-2019-19006, another FreePBX bug exploited by the same hacking group.

    Now, non-profit organization The Shadowserver Foundation says that approximately 900 FreePBX instances remain compromised and are running web shells. The endpoint manager deployments were likely compromised via CVE-2025-64328, it notes.

    Most of the compromised instances (roughly 400) are in the US, data from The Shadowserver Foundation shows. Dozens of instances are in Brazil, Canada, Germany, France, the UK, Italy, and the Netherlands, and smaller numbers in many other countries.

    Users are advised to update the filestore module in their FreePBX deployments to the latest version, to restrict access to the administrative panel to authorized users, and to block access from known malicious sources.

    Related: Aeternum Botnet Loader Employs Polygon Blockchain C&C to Boost Resilience

    Related: Critical Flaws Exposed Gardyn Smart Gardens to Remote Hacking

    Related: SystemBC Infects 10,000 Devices After Defying Law Enforcement Takedown

    Related: Zyxel Patches Critical Vulnerability in Many Device Models

    FreePBX Infected instances Sangoma Shells Web
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleGoogle Photos 7.64.0.874762840 APK Download by Google LLC
    Next Article 4 creative ways I use Obsidian Canvas that aren’t just flowcharts
    admin
    • Website

    Related Posts

    Police dismantles online gambling ring exploiting Ukrainian women

    March 5, 2026

    Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild

    March 5, 2026

    Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks

    March 5, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Police dismantles online gambling ring exploiting Ukrainian women

    March 5, 2026

    If AI Can’t Read Your CMS, It Can’t Recommend Your Brand [Webinar]

    March 5, 2026

    The Aiper Experts Duo with Cognitive AI is the closest thing to a self-cleaning pool

    March 5, 2026

    Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild

    March 5, 2026
    Categories
    • Blogging (33)
    • Cybersecurity (614)
    • Privacy & Online Earning (91)
    • SEO & Digital Marketing (388)
    • Tech Tools & Mobile / Apps (752)
    • WiFi / Internet & Networking (109)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Police dismantles online gambling ring exploiting Ukrainian women

    March 5, 2026

    If AI Can’t Read Your CMS, It Can’t Recommend Your Brand [Webinar]

    March 5, 2026

    The Aiper Experts Duo with Cognitive AI is the closest thing to a self-cleaning pool

    March 5, 2026
    Most Popular
    • Police dismantles online gambling ring exploiting Ukrainian women
    • If AI Can’t Read Your CMS, It Can’t Recommend Your Brand [Webinar]
    • The Aiper Experts Duo with Cognitive AI is the closest thing to a self-cleaning pool
    • Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild
    • Walmart Has a Preorder Deal on the New M4 iPad Air
    • Google removes accessibility section from JavaScript SEO section
    • Home Assistant 2026.3 has arrived: Here’s what’s new
    • Digital sovereignty options for on-prem deployments
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.