Description
A local privilege escalation vulnerability exists in the safe_asterisk script included with the Asterisk toolkit package. When Asterisk is started via this script (common in SysV init or FreePBX environments), it sources all .sh files located in /etc/asterisk/startup.d/ as root, without validating ownership or permissions. Non-root users with legitimate write access to /etc/asterisk can exploit this behaviour by placing malicious scripts in the startup.d directory, which will then execute with root privileges upon service restart.
INFO
Published Date :
2025-09-23T04:31:02.784Z
Last Modified :
2026-02-26T17:48:19.381Z
Source :
Gridware
AFFECTED PRODUCTS
The following products are affected by CVE-2025-1131 vulnerability.
| Vendors | Products |
|---|---|
| Asterisk |
|
| Sangoma |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-1131.