CVE-2018-16221

The diagnostics web interface in the Yeahlink Ultra-elegant IP Phone SIP-T41P (firmware 66.83.0.35) does not validate (escape) the path information (path traversal), which allows an authenticated remote attacker to get access to privileged information (e.g., /etc/passwd) via path traversal (relative path information in the file parameter of the corresponding POST request).
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:yealink:ultra-elegant_ip_phone_sip-t41p_firmware:66.83.0.35:*:*:*:*:*:*:*
cpe:2.3:h:yealink:ultra-elegant_ip_phone_sip-t41p:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2019-05-29 18:29

Updated : 2024-02-04 20:20


NVD link : CVE-2018-16221

Mitre link : CVE-2018-16221

CVE.ORG link : CVE-2018-16221


JSON object : View

Products Affected

yealink

  • ultra-elegant_ip_phone_sip-t41p
  • ultra-elegant_ip_phone_sip-t41p_firmware
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')