Description
Yealink phones through 2019-08-04 do not properly check user roles in POST requests. Consequently, the default User account (with a password of user) can make admin requests via HTTP.
References (2)
Core 2
Core References
Exploit, Third Party Advisory x_refsource_misc
http://cerebusforensics.com/yealink/exploit.html
Exploit, Third Party Advisory x_refsource_misc
https://sway.office.com/3pCb559LYVuT0eig
Scores
CVSS v3
8.8
EPSS
0.0040
EPSS Percentile
61.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-434
Status
published
Products (3)
yeahlink/t49g_firmware
< 2019-08-04
yeahlink/t58v_firmware
< 2019-08-04
yeahlink/vp59_firmware
< 2019-08-04
Published
Oct 08, 2019
Tracked Since
Feb 18, 2026