Yealink phones through 2019-08-04 do not properly check user roles in POST requests. Consequently, the default User account (with a password of user) can make admin requests via HTTP.
References
Link | Resource |
---|---|
http://cerebusforensics.com/yealink/exploit.html | Exploit Third Party Advisory |
https://sway.office.com/3pCb559LYVuT0eig | Exploit Third Party Advisory |
http://cerebusforensics.com/yealink/exploit.html | Exploit Third Party Advisory |
https://sway.office.com/3pCb559LYVuT0eig | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
21 Nov 2024, 04:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://cerebusforensics.com/yealink/exploit.html - Exploit, Third Party Advisory | |
References | () https://sway.office.com/3pCb559LYVuT0eig - Exploit, Third Party Advisory |
Information
Published : 2019-10-08 13:15
Updated : 2024-11-21 04:27
NVD link : CVE-2019-14656
Mitre link : CVE-2019-14656
CVE.ORG link : CVE-2019-14656
JSON object : View
Products Affected
yeahlink
- vp59_firmware
- t49g_firmware
- vp59
- t49g
- t58v_firmware
- t58v
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type