This document summarizes the authors' experience over two years fuzzing VoIP devices to discover vulnerabilities. They used their in-house tool KIF to conduct stateful protocol fuzzing on a variety of VoIP equipment. The testing uncovered many vulnerabilities related to weak input validation, including buffer overflows and format string issues. Some vulnerabilities allowed compromising internal networks by exploiting unfiltered web interfaces on VoIP phones. The authors disclosed vulnerabilities responsibly and provided mitigation techniques.