Yealink phones through 2019-08-04 have an issue with OpenVPN file upload. They execute tar as root to extract files, but do not validate the extraction directory. Creating a tar file with ../../../../ allows replacement of almost any file on a phone. This leads to password replacement and arbitrary code execution as root.
References
Link | Resource |
---|---|
http://cerebusforensics.com/yealink/exploit.html | Exploit Third Party Advisory |
https://sway.office.com/3pCb559LYVuT0eig | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
No history.
Information
Published : 2019-10-08 13:15
Updated : 2019-10-18 14:47
NVD link : CVE-2019-14657
Mitre link : CVE-2019-14657
CVE.ORG link : CVE-2019-14657
JSON object : View
Products Affected
yeahlink
- t58v_firmware
- vp59
- t58v
- t49g_firmware
- t49g
- vp59_firmware