First published: Wed May 29 2019(Updated: )
The diagnostics web interface in the Yeahlink Ultra-elegant IP Phone SIP-T41P (firmware 66.83.0.35) does not validate (escape) the path information (path traversal), which allows an authenticated remote attacker to get access to privileged information (e.g., /etc/passwd) via path traversal (relative path information in the file parameter of the corresponding POST request).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Yealink Ultra-elegant IP Phone SIP-T41P | =66.83.0.35 | |
Yealink Ultra-elegant IP Phone SIP-T41P |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2018-16221.
The severity of CVE-2018-16221 is high (8.0).
The Yeahlink Ultra-elegant IP Phone SIP-T41P firmware version 66.83.0.35 is affected by CVE-2018-16221.
CVE-2018-16221 is a path traversal vulnerability.
An authenticated remote attacker can exploit CVE-2018-16221 by using path traversal to access privileged information.