4 results (0.001 seconds)

CVSS: 8.0EPSS: 0%CPEs: 2EXPL: 0

29 May 2019 — The diagnostics web interface in the Yeahlink Ultra-elegant IP Phone SIP-T41P (firmware 66.83.0.35) does not validate (escape) the path information (path traversal), which allows an authenticated remote attacker to get access to privileged information (e.g., /etc/passwd) via path traversal (relative path information in the file parameter of the corresponding POST request). La interfaz web de diagnóstico en Yeahlink Ultra-elegant IP Phone SIP-T41P (firmware 66.83.0.35) no es validado (escape) el path de info... • https://www.sit.fraunhofer.de/de/securitytestlab • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 8.8EPSS: 3%CPEs: 2EXPL: 1

29 May 2019 — A CSRF (Cross Site Request Forgery) in the web interface of the Yeahlink Ultra-elegant IP Phone SIP-T41P firmware version 66.83.0.35 allows a remote attacker to trigger code execution or settings modification on the device by providing a crafted link to the victim. Un CSRF (Cross Site Request Forgery) en la interfaz web de Yeahlink Ultra-elegant IP Phone SIP-T41P firmware version 66.83.0.35, permite que un atacante remoto desencadene la ejecución de código o la modificación de la configuración en el disposi... • https://www.sit.fraunhofer.de/de/securitytestlab • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 9.0EPSS: 0%CPEs: 2EXPL: 0

29 May 2019 — The network diagnostic function (ping) in the Yeahlink Ultra-elegant IP Phone SIP-T41P (firmware 66.83.0.35) allows a remote authenticated attacker to trigger OS commands or open a reverse shell via command injection. La función de diagnóstico de red (ping) en Yeahlink Ultra-elegant IP Phone SIP-T41P (firmware 66.83.0.35), le permite a un atacante remoto autenticado desencadenar los comandos del sistema operativo o abrir un shell inverso por medio de la inyección de comandos. • https://www.sit.fraunhofer.de/de/securitytestlab • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 5.4EPSS: 0%CPEs: 14EXPL: 3

17 Sep 2014 — Multiple cross-site scripting (XSS) vulnerabilities in Local Phone book and Blacklist form in Yealink VOIP Phones allow remote authenticated users to inject arbitrary web script or HTML via the user field to cgi-bin/ConfigManApp.com. Múltiples vulnerabilidades de XSS en Local Phone book y Blacklist en Yealink VOIP Phones permiten a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través del campo 'user' hacia cgi-bin/ConfigManApp.com. • https://www.exploit-db.com/exploits/18540 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •