First published: Tue Oct 08 2019(Updated: )
Yealink phones through 2019-08-04 have an issue with OpenVPN file upload. They execute tar as root to extract files, but do not validate the extraction directory. Creating a tar file with ../../../../ allows replacement of almost any file on a phone. This leads to password replacement and arbitrary code execution as root.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Yealink VP59 Firmware | <=2019-08-04 | |
Yealink VP59 Firmware | ||
Yealink T49G Firmware | <=2019-08-04 | |
Yealink T49G | ||
Yealink T58V Firmware | <=2019-08-04 | |
Yealink T58V Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14657 is considered to have a high severity due to the potential for arbitrary file replacement on Yealink phones.
To fix CVE-2019-14657, upgrade the firmware of your Yealink devices to a version released after August 4, 2019.
CVE-2019-14657 affects specific Yealink phone models, including VP59, T49G, and T58V with firmware versions up to 2019-08-04.
The exploitation of CVE-2019-14657 can lead to unauthorized access, allowing attackers to replace critical files and potentially compromise the device's security.
Yes, CVE-2019-14657 is remotely exploitable, as it involves file upload vulnerabilities that can be triggered without physical access to the device.