Arbitrary Code Execution and Password Replacement Vulnerability in Yealink Phones

Arbitrary Code Execution and Password Replacement Vulnerability in Yealink Phones

CVE-2019-14657 · HIGH Severity

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Yealink phones through 2019-08-04 have an issue with OpenVPN file upload. They execute tar as root to extract files, but do not validate the extraction directory. Creating a tar file with ../../../../ allows replacement of almost any file on a phone. This leads to password replacement and arbitrary code execution as root.

Learn more about our Web Application Penetration Testing UK.