Show filters
17 Total Results
Displaying 1-10 of 17
Sort by:
Attacker Value
Unknown

CVE-2024-48353

Disclosure Date: November 01, 2024 (last updated November 06, 2024)
Yealink Meeting Server before V26.0.0.67 allows attackers to obtain static key information from a front-end JS file and decrypt the plaintext passwords based on the obtained key information.
Attacker Value
Unknown

CVE-2024-48352

Disclosure Date: November 01, 2024 (last updated November 06, 2024)
Yealink Meeting Server before V26.0.0.67 is vulnerable to sensitive data exposure in the server response via sending HTTP request with enterprise ID.
Attacker Value
Unknown

CVE-2024-33109

Disclosure Date: September 19, 2024 (last updated September 26, 2024)
Directory Traversal in the web interface of the Tiptel IP 286 with firmware version 2.61.13.10 allows attackers to overwrite arbitrary files on the phone via the Ringtone upload function.
Attacker Value
Unknown

CVE-2024-24091

Disclosure Date: February 08, 2024 (last updated September 06, 2024)
Yealink Meeting Server before v26.0.0.66 was discovered to contain an OS command injection vulnerability via the file upload interface.
Attacker Value
Unknown

CVE-2023-43959

Disclosure Date: October 17, 2023 (last updated October 25, 2023)
An issue in YeaLinkSIP-T19P-E2 v.53.84.0.15 allows a remote privileged attacker to execute arbitrary code via a crafted request the ping function of the diagnostic component.
Attacker Value
Unknown

CVE-2020-24113

Disclosure Date: August 22, 2023 (last updated October 08, 2023)
Directory Traversal vulnerability in Contacts File Upload Interface in Yealink W60B version 77.83.0.85, allows attackers to gain sensitive information and cause a denial of service (DoS).
Attacker Value
Unknown

CVE-2021-27561

Disclosure Date: October 15, 2021 (last updated February 23, 2025)
Yealink Device Management (DM) 3.6.0.20 allows command injection as root via the /sm/api/v1/firewall/zone/services URI, without authentication.
Attacker Value
Unknown

CVE-2018-16221

Disclosure Date: May 29, 2019 (last updated November 27, 2024)
The diagnostics web interface in the Yeahlink Ultra-elegant IP Phone SIP-T41P (firmware 66.83.0.35) does not validate (escape) the path information (path traversal), which allows an authenticated remote attacker to get access to privileged information (e.g., /etc/passwd) via path traversal (relative path information in the file parameter of the corresponding POST request).
0
Attacker Value
Unknown

CVE-2018-16218

Disclosure Date: May 29, 2019 (last updated November 27, 2024)
A CSRF (Cross Site Request Forgery) in the web interface of the Yeahlink Ultra-elegant IP Phone SIP-T41P firmware version 66.83.0.35 allows a remote attacker to trigger code execution or settings modification on the device by providing a crafted link to the victim.
0
Attacker Value
Unknown

CVE-2018-16217

Disclosure Date: May 29, 2019 (last updated November 27, 2024)
The network diagnostic function (ping) in the Yeahlink Ultra-elegant IP Phone SIP-T41P (firmware 66.83.0.35) allows a remote authenticated attacker to trigger OS commands or open a reverse shell via command injection.
0