CVE-2013-5758
Yealink VoIP Phone SIP-T38G - Privilege Escalation
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
7Exploited in Wild
-Decision
Descriptions
cgi-bin/cgiServer.exx in Yealink VoIP Phone SIP-T38G allows remote authenticated users to execute arbitrary commands by calling the system method in the body of a request, as demonstrated by running unauthorized services, changing directory permissions, and modifying files.
cgi-bin/cgiServer.exx en Yealink VoIP Phone SIP-T38G permite a usuarios remotos autenticados ejecutar comandos arbitrarios mediante la llamada al método del sistema en el cuerpo de una solicitud, tal y como fue demostrado mediante la puesta en funcionamiento de servicios no autorizados, el cambio de los permisos de los directorios y la modificación de ficheros.
Yealink VoIP phone version SIP-T38G suffers from a remote command execution vulnerability.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2013-09-18 CVE Reserved
- 2014-06-13 CVE Published
- 2014-06-13 First Exploit
- 2024-08-06 CVE Updated
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://www.osvdb.org/108080 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|