CVE-2013-5757

Yealink Sip-t38g - Path Traversal

Title source: rule
STIX 2.1

Description

Absolute path traversal vulnerability in Yealink VoIP Phone SIP-T38G allows remote authenticated users to read arbitrary files via a full pathname in the dumpConfigFile function in the command parameter to cgi-bin/cgiServer.exx.

Exploits (1)

exploitdb WORKING POC
by Mr.Un1k0d3r · textwebappshardware
https://www.exploit-db.com/exploits/33740

References (1)

Core 1
Core References
Exploit exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/33740

Scores

EPSS 0.0952
EPSS Percentile 92.9%

Details

CWE
CWE-22
Status published
Products (1)
yealink/sip-t38g
Published Aug 03, 2014
Tracked Since Feb 18, 2026