CVE-2013-5758

cgi-bin/cgiServer.exx in Yealink VoIP Phone SIP-T38G allows remote authenticated users to execute arbitrary commands by calling the system method in the body of a request, as demonstrated by running unauthorized services, changing directory permissions, and modifying files.
Configurations

Configuration 1 (hide)

cpe:2.3:h:yealink:sip-t38g:-:*:*:*:*:*:*:*

History

21 Nov 2024, 01:58

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/127093/Yealink-VoIP-Phone-SIP-T38G-Privilege-Escalation.html - Exploit () http://packetstormsecurity.com/files/127093/Yealink-VoIP-Phone-SIP-T38G-Privilege-Escalation.html - Exploit
References () http://packetstormsecurity.com/files/127096/Yealink-VoIP-Phone-SIP-T38G-Remote-Command-Execution.html - Exploit () http://packetstormsecurity.com/files/127096/Yealink-VoIP-Phone-SIP-T38G-Remote-Command-Execution.html - Exploit
References () http://www.exploit-db.com/exploits/33741 - Exploit () http://www.exploit-db.com/exploits/33741 - Exploit
References () http://www.exploit-db.com/exploits/33742 - Exploit () http://www.exploit-db.com/exploits/33742 - Exploit
References () http://www.osvdb.org/108080 - () http://www.osvdb.org/108080 -

Information

Published : 2014-08-03 18:55

Updated : 2024-11-21 01:58


NVD link : CVE-2013-5758

Mitre link : CVE-2013-5758

CVE.ORG link : CVE-2013-5758


JSON object : View

Products Affected

yealink

  • sip-t38g
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')