cgi-bin/cgiServer.exx in Yealink VoIP Phone SIP-T38G allows remote authenticated users to execute arbitrary commands by calling the system method in the body of a request, as demonstrated by running unauthorized services, changing directory permissions, and modifying files.
                
            References
                    Configurations
                    History
                    21 Nov 2024, 01:58
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://packetstormsecurity.com/files/127093/Yealink-VoIP-Phone-SIP-T38G-Privilege-Escalation.html - Exploit | |
| References | () http://packetstormsecurity.com/files/127096/Yealink-VoIP-Phone-SIP-T38G-Remote-Command-Execution.html - Exploit | |
| References | () http://www.exploit-db.com/exploits/33741 - Exploit | |
| References | () http://www.exploit-db.com/exploits/33742 - Exploit | |
| References | () http://www.osvdb.org/108080 - | 
Information
                Published : 2014-08-03 18:55
Updated : 2025-04-12 10:46
NVD link : CVE-2013-5758
Mitre link : CVE-2013-5758
CVE.ORG link : CVE-2013-5758
JSON object : View
Products Affected
                yealink
- sip-t38g
CWE
                
                    
                        
                        CWE-78
                        
            Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
