
CVE-2018-16221
https://notcve.org/view.php?id=CVE-2018-16221
29 May 2019 — The diagnostics web interface in the Yeahlink Ultra-elegant IP Phone SIP-T41P (firmware 66.83.0.35) does not validate (escape) the path information (path traversal), which allows an authenticated remote attacker to get access to privileged information (e.g., /etc/passwd) via path traversal (relative path information in the file parameter of the corresponding POST request). La interfaz web de diagnóstico en Yeahlink Ultra-elegant IP Phone SIP-T41P (firmware 66.83.0.35) no es validado (escape) el path de info... • https://www.sit.fraunhofer.de/de/securitytestlab • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2018-16218
https://notcve.org/view.php?id=CVE-2018-16218
29 May 2019 — A CSRF (Cross Site Request Forgery) in the web interface of the Yeahlink Ultra-elegant IP Phone SIP-T41P firmware version 66.83.0.35 allows a remote attacker to trigger code execution or settings modification on the device by providing a crafted link to the victim. Un CSRF (Cross Site Request Forgery) en la interfaz web de Yeahlink Ultra-elegant IP Phone SIP-T41P firmware version 66.83.0.35, permite que un atacante remoto desencadene la ejecución de código o la modificación de la configuración en el disposi... • https://www.sit.fraunhofer.de/de/securitytestlab • CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2018-16217
https://notcve.org/view.php?id=CVE-2018-16217
29 May 2019 — The network diagnostic function (ping) in the Yeahlink Ultra-elegant IP Phone SIP-T41P (firmware 66.83.0.35) allows a remote authenticated attacker to trigger OS commands or open a reverse shell via command injection. La función de diagnóstico de red (ping) en Yeahlink Ultra-elegant IP Phone SIP-T41P (firmware 66.83.0.35), le permite a un atacante remoto autenticado desencadenar los comandos del sistema operativo o abrir un shell inverso por medio de la inyección de comandos. • https://www.sit.fraunhofer.de/de/securitytestlab • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •