- EPSS 8.43%
- Veröffentlicht 03.08.2014 18:55:04
- Zuletzt bearbeitet 12.04.2025 10:46:40
Directory traversal vulnerability in Yealink VoIP Phone SIP-T38G allows remote authenticated users to read arbitrary files via a .. (dot dot) in the page parameter to cgi-bin/cgiServer.exx.
- EPSS 10.16%
- Veröffentlicht 03.08.2014 18:55:04
- Zuletzt bearbeitet 12.04.2025 10:46:40
Absolute path traversal vulnerability in Yealink VoIP Phone SIP-T38G allows remote authenticated users to read arbitrary files via a full pathname in the dumpConfigFile function in the command parameter to cgi-bin/cgiServer.exx.
- EPSS 10.71%
- Veröffentlicht 03.08.2014 18:55:04
- Zuletzt bearbeitet 12.04.2025 10:46:40
cgi-bin/cgiServer.exx in Yealink VoIP Phone SIP-T38G allows remote authenticated users to execute arbitrary commands by calling the system method in the body of a request, as demonstrated by running unauthorized services, changing directory permissio...
- EPSS 16.35%
- Veröffentlicht 16.07.2014 14:19:02
- Zuletzt bearbeitet 12.04.2025 10:46:40
config/.htpasswd in Yealink IP Phone SIP-T38G has a hardcoded password of (1) user (s7C9Cx.rLsWFA) for the user account, (2) admin (uoCbM.VEiKQto) for the admin account, and (3) var (jhl3iZAe./qXM) for the var account, which makes it easier for remot...