Yealink phones through 2019-08-04 do not properly check user roles in POST requests. Consequently, the default User account (with a password of user) can make admin requests via HTTP.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
http://cerebusforensics.com/yealink/exploit.html | third party advisory exploit |
https://sway.office.com/3pCb559LYVuT0eig | third party advisory exploit |