A CSRF (Cross Site Request Forgery) in the web interface of the Yeahlink Ultra-elegant IP Phone SIP-T41P firmware version 66.83.0.35 allows a remote attacker to trigger code execution or settings modification on the device by providing a crafted link to the victim.
References
Link | Resource |
---|---|
https://www.sit.fraunhofer.de/de/securitytestlab/ | Third Party Advisory |
https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_Yealink_Ultra-elegantIPPhone_SIPT41P.pdf?_=1549375271 | Exploit Mitigation Third Party Advisory |
https://www.sit.fraunhofer.de/de/securitytestlab/ | Third Party Advisory |
https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_Yealink_Ultra-elegantIPPhone_SIPT41P.pdf?_=1549375271 | Exploit Mitigation Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.sit.fraunhofer.de/de/securitytestlab/ - Third Party Advisory | |
References | () https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_Yealink_Ultra-elegantIPPhone_SIPT41P.pdf?_=1549375271 - Exploit, Mitigation, Third Party Advisory |
Information
Published : 2019-05-29 18:29
Updated : 2024-11-21 03:52
NVD link : CVE-2018-16218
Mitre link : CVE-2018-16218
CVE.ORG link : CVE-2018-16218
JSON object : View
Products Affected
yealink
- ultra-elegant_ip_phone_sip-t41p_firmware
- ultra-elegant_ip_phone_sip-t41p
CWE
CWE-352
Cross-Site Request Forgery (CSRF)