First published: Sun Aug 03 2014(Updated: )
Absolute path traversal vulnerability in Yealink VoIP Phone SIP-T38G allows remote authenticated users to read arbitrary files via a full pathname in the dumpConfigFile function in the command parameter to cgi-bin/cgiServer.exx.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Yealink SIP-T38G |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5757 is considered a medium severity vulnerability due to its potential for unauthorized file access.
To fix CVE-2013-5757, update the Yealink SIP-T38G firmware to the latest version that addresses this vulnerability.
Users of Yealink SIP-T38G VoIP phones are affected by CVE-2013-5757 if they have remote authenticated access enabled.
CVE-2013-5757 is classified as an absolute path traversal vulnerability.
An attacker can exploit CVE-2013-5757 to read arbitrary files on the device by using a full pathname in specific command parameters.