Yealink phones through 2019-08-04 have an issue with OpenVPN file upload. They execute tar as root to extract files, but do not validate the extraction directory. Creating a tar file with ../../../../ allows replacement of almost any file on a phone. This leads to password replacement and arbitrary code execution as root.
References
Link | Resource |
---|---|
http://cerebusforensics.com/yealink/exploit.html | Exploit Third Party Advisory |
https://sway.office.com/3pCb559LYVuT0eig | Exploit Third Party Advisory |
http://cerebusforensics.com/yealink/exploit.html | Exploit Third Party Advisory |
https://sway.office.com/3pCb559LYVuT0eig | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
21 Nov 2024, 04:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://cerebusforensics.com/yealink/exploit.html - Exploit, Third Party Advisory | |
References | () https://sway.office.com/3pCb559LYVuT0eig - Exploit, Third Party Advisory |
Information
Published : 2019-10-08 13:15
Updated : 2024-11-21 04:27
NVD link : CVE-2019-14657
Mitre link : CVE-2019-14657
CVE.ORG link : CVE-2019-14657
JSON object : View
Products Affected
yeahlink
- vp59_firmware
- t49g_firmware
- vp59
- t49g
- t58v_firmware
- t58v