Yealink phones through 2019-08-04 do not properly check user roles in POST requests. Consequently, the default User account (with a password of user) can make admin requests via HTTP.
References
Link Resource
http://cerebusforensics.com/yealink/exploit.html Exploit Third Party Advisory
https://sway.office.com/3pCb559LYVuT0eig Exploit Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2019-10-08T12:01:20

Updated: 2019-10-08T12:01:20

Reserved: 2019-08-04T00:00:00


Link: CVE-2019-14656

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2019-10-08T13:15:15.237

Modified: 2019-10-17T18:51:56.280


Link: CVE-2019-14656

JSON object: View

cve-icon Redhat Information

No data.

CWE