Show filters
17 Total Results
Displaying 1-10 of 17
Sort by:
Attacker Value
Unknown
CVE-2024-48353
Disclosure Date: November 01, 2024 (last updated November 06, 2024)
Yealink Meeting Server before V26.0.0.67 allows attackers to obtain static key information from a front-end JS file and decrypt the plaintext passwords based on the obtained key information.
0
Attacker Value
Unknown
CVE-2024-48352
Disclosure Date: November 01, 2024 (last updated November 06, 2024)
Yealink Meeting Server before V26.0.0.67 is vulnerable to sensitive data exposure in the server response via sending HTTP request with enterprise ID.
0
Attacker Value
Unknown
CVE-2024-33109
Disclosure Date: September 19, 2024 (last updated September 26, 2024)
Directory Traversal in the web interface of the Tiptel IP 286 with firmware version 2.61.13.10 allows attackers to overwrite arbitrary files on the phone via the Ringtone upload function.
0
Attacker Value
Unknown
CVE-2024-24091
Disclosure Date: February 08, 2024 (last updated September 06, 2024)
Yealink Meeting Server before v26.0.0.66 was discovered to contain an OS command injection vulnerability via the file upload interface.
0
Attacker Value
Unknown
CVE-2023-43959
Disclosure Date: October 17, 2023 (last updated October 25, 2023)
An issue in YeaLinkSIP-T19P-E2 v.53.84.0.15 allows a remote privileged attacker to execute arbitrary code via a crafted request the ping function of the diagnostic component.
0
Attacker Value
Unknown
CVE-2020-24113
Disclosure Date: August 22, 2023 (last updated October 08, 2023)
Directory Traversal vulnerability in Contacts File Upload Interface in Yealink W60B version 77.83.0.85, allows attackers to gain sensitive information and cause a denial of service (DoS).
0
Attacker Value
Unknown
CVE-2021-27561
Disclosure Date: October 15, 2021 (last updated February 23, 2025)
Yealink Device Management (DM) 3.6.0.20 allows command injection as root via the /sm/api/v1/firewall/zone/services URI, without authentication.
0
Attacker Value
Unknown
CVE-2018-16221
Disclosure Date: May 29, 2019 (last updated November 27, 2024)
The diagnostics web interface in the Yeahlink Ultra-elegant IP Phone SIP-T41P (firmware 66.83.0.35) does not validate (escape) the path information (path traversal), which allows an authenticated remote attacker to get access to privileged information (e.g., /etc/passwd) via path traversal (relative path information in the file parameter of the corresponding POST request).
0
Attacker Value
Unknown
CVE-2018-16218
Disclosure Date: May 29, 2019 (last updated November 27, 2024)
A CSRF (Cross Site Request Forgery) in the web interface of the Yeahlink Ultra-elegant IP Phone SIP-T41P firmware version 66.83.0.35 allows a remote attacker to trigger code execution or settings modification on the device by providing a crafted link to the victim.
0
Attacker Value
Unknown
CVE-2018-16217
Disclosure Date: May 29, 2019 (last updated November 27, 2024)
The network diagnostic function (ping) in the Yeahlink Ultra-elegant IP Phone SIP-T41P (firmware 66.83.0.35) allows a remote authenticated attacker to trigger OS commands or open a reverse shell via command injection.
0