CVE-2023-43959

An issue in YeaLinkSIP-T19P-E2 v.53.84.0.15 allows a remote privileged attacker to execute arbitrary code via a crafted request the ping function of the diagnostic component.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:yealink:sip-t19p-e2_firmware:53.84.0.15:*:*:*:*:*:*:*
cpe:2.3:h:yealink:sip-t19p-e2:-:*:*:*:*:*:*:*

History

21 Nov 2024, 08:25

Type Values Removed Values Added
References () https://hackmd.io/%40tahaafarooq/auth_rce_voip - () https://hackmd.io/%40tahaafarooq/auth_rce_voip -
References () https://www.exploit-db.com/exploits/50509 - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/50509 - Exploit, Third Party Advisory, VDB Entry

07 Nov 2023, 04:21

Type Values Removed Values Added
References
  • {'url': 'https://hackmd.io/@tahaafarooq/auth_rce_voip', 'name': 'https://hackmd.io/@tahaafarooq/auth_rce_voip', 'tags': ['Exploit', 'Third Party Advisory'], 'refsource': 'MISC'}
  • () https://hackmd.io/%40tahaafarooq/auth_rce_voip -

24 Oct 2023, 20:37

Type Values Removed Values Added
CPE cpe:2.3:h:yealink:sip-t19p-e2:-:*:*:*:*:*:*:*
cpe:2.3:o:yealink:sip-t19p-e2_firmware:53.84.0.15:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CWE CWE-78
First Time Yealink
Yealink sip-t19p-e2
Yealink sip-t19p-e2 Firmware
References (MISC) https://hackmd.io/@tahaafarooq/auth_rce_voip - (MISC) https://hackmd.io/@tahaafarooq/auth_rce_voip - Exploit, Third Party Advisory
References (MISC) https://www.exploit-db.com/exploits/50509 - (MISC) https://www.exploit-db.com/exploits/50509 - Exploit, Third Party Advisory, VDB Entry

17 Oct 2023, 15:07

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-17 14:15

Updated : 2024-11-21 08:25


NVD link : CVE-2023-43959

Mitre link : CVE-2023-43959

CVE.ORG link : CVE-2023-43959


JSON object : View

Products Affected

yealink

  • sip-t19p-e2_firmware
  • sip-t19p-e2
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')