CVE-2019-14657

HIGH

Yealink phones <2019-08-04 - RCE

Title source: llm
STIX 2.1

Description

Yealink phones through 2019-08-04 have an issue with OpenVPN file upload. They execute tar as root to extract files, but do not validate the extraction directory. Creating a tar file with ../../../../ allows replacement of almost any file on a phone. This leads to password replacement and arbitrary code execution as root.

References (2)

Core 2
Core References
Exploit, Third Party Advisory x_refsource_misc
http://cerebusforensics.com/yealink/exploit.html
Exploit, Third Party Advisory x_refsource_misc
https://sway.office.com/3pCb559LYVuT0eig

Scores

CVSS v3 8.8
EPSS 0.0183
EPSS Percentile 83.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-22 CWE-434
Status published
Products (3)
yeahlink/t49g_firmware < 2019-08-04
yeahlink/t58v_firmware < 2019-08-04
yeahlink/vp59_firmware < 2019-08-04
Published Oct 08, 2019
Tracked Since Feb 18, 2026