CVE-2018-16217

The network diagnostic function (ping) in the Yeahlink Ultra-elegant IP Phone SIP-T41P (firmware 66.83.0.35) allows a remote authenticated attacker to trigger OS commands or open a reverse shell via command injection.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:yealink:ultra-elegant_ip_phone_sip-t41p_firmware:66.83.0.35:*:*:*:*:*:*:*
cpe:2.3:h:yealink:ultra-elegant_ip_phone_sip-t41p:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:52

Type Values Removed Values Added
References () https://www.sit.fraunhofer.de/de/securitytestlab/ - Third Party Advisory () https://www.sit.fraunhofer.de/de/securitytestlab/ - Third Party Advisory
References () https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_Yealink_Ultra-elegantIPPhone_SIPT41P.pdf?_=1549375271 - Third Party Advisory () https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_Yealink_Ultra-elegantIPPhone_SIPT41P.pdf?_=1549375271 - Third Party Advisory

Information

Published : 2019-05-29 18:29

Updated : 2024-11-21 03:52


NVD link : CVE-2018-16217

Mitre link : CVE-2018-16217

CVE.ORG link : CVE-2018-16217


JSON object : View

Products Affected

yealink

  • ultra-elegant_ip_phone_sip-t41p_firmware
  • ultra-elegant_ip_phone_sip-t41p
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')