cgi-bin/cgiServer.exx in Yealink VoIP Phone SIP-T38G allows remote authenticated users to execute arbitrary commands by calling the system method in the body of a request, as demonstrated by running unauthorized services, changing directory permissions, and modifying files.
References
Configurations
History
21 Nov 2024, 01:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/127093/Yealink-VoIP-Phone-SIP-T38G-Privilege-Escalation.html - Exploit | |
References | () http://packetstormsecurity.com/files/127096/Yealink-VoIP-Phone-SIP-T38G-Remote-Command-Execution.html - Exploit | |
References | () http://www.exploit-db.com/exploits/33741 - Exploit | |
References | () http://www.exploit-db.com/exploits/33742 - Exploit | |
References | () http://www.osvdb.org/108080 - |
Information
Published : 2014-08-03 18:55
Updated : 2024-11-21 01:58
NVD link : CVE-2013-5758
Mitre link : CVE-2013-5758
CVE.ORG link : CVE-2013-5758
JSON object : View
Products Affected
yealink
- sip-t38g
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')