Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Yealink VoIP Phone SIP-T38G Multiple Vulnerabilities
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
This host is running Yealink VoIP Phone and is prone to multiple vulnerabilities.
Insight
Insight
- The 'user' account has a password of 'user' (hash = s7C9Cx.rLsWFA), the 'admin' account has a password of 'admin' (hash = uoCbM.VEiKQto), and the 'var' account has a password of 'var' (hash = jhl3iZAe./qXM). - The '/cgi-bin/cgiServer.exx' script not properly sanitizing user input, specifically encoded path traversal style attacks (e.g. '%2F') supplied via the 'page' parameter. - Contains a flaw in the /cgi-bin/cgiServer.exx script that is triggered when handling system calls. - The /cgi-bin/cgiServer.exx script not properly sanitizing user input, specifically absolute paths supplied via the 'command' parameter.
Affected Software
Affected Software
Yealink VoIP Phone SIP-T38G
Detection Method
Detection Method
Send a crafted default credential via HTTP GET request and check whether it is able to login or not.
Solution
Solution
No known solution was made available for at least one year since the disclosure of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.