Vulnerabilities (CVE)

Filtered by vendor Yealink Subscribe
Filtered by product Ultra-elegant Ip Phone Sip-t41p
Total 4 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2018-16221 1 Yealink 2 Ultra-elegant Ip Phone Sip-t41p, Ultra-elegant Ip Phone Sip-t41p Firmware 2024-02-04 7.7 HIGH 8.0 HIGH
The diagnostics web interface in the Yeahlink Ultra-elegant IP Phone SIP-T41P (firmware 66.83.0.35) does not validate (escape) the path information (path traversal), which allows an authenticated remote attacker to get access to privileged information (e.g., /etc/passwd) via path traversal (relative path information in the file parameter of the corresponding POST request).
CVE-2018-16217 1 Yealink 2 Ultra-elegant Ip Phone Sip-t41p, Ultra-elegant Ip Phone Sip-t41p Firmware 2024-02-04 9.0 HIGH 8.8 HIGH
The network diagnostic function (ping) in the Yeahlink Ultra-elegant IP Phone SIP-T41P (firmware 66.83.0.35) allows a remote authenticated attacker to trigger OS commands or open a reverse shell via command injection.
CVE-2018-16218 1 Yealink 2 Ultra-elegant Ip Phone Sip-t41p, Ultra-elegant Ip Phone Sip-t41p Firmware 2024-02-04 6.8 MEDIUM 8.8 HIGH
A CSRF (Cross Site Request Forgery) in the web interface of the Yeahlink Ultra-elegant IP Phone SIP-T41P firmware version 66.83.0.35 allows a remote attacker to trigger code execution or settings modification on the device by providing a crafted link to the victim.
CVE-2012-1417 1 Yealink 14 Gigabit Color Ip Phone Sip-t32g, Gigabit Color Ip Phone Sip-t38g, Ip Phone Sip-t19p and 11 more 2024-02-04 3.5 LOW N/A
Multiple cross-site scripting (XSS) vulnerabilities in Local Phone book and Blacklist form in Yealink VOIP Phones allow remote authenticated users to inject arbitrary web script or HTML via the user field to cgi-bin/ConfigManApp.com.