Vulnerability Details : CVE-2013-5758
Potential exploit
cgi-bin/cgiServer.exx in Yealink VoIP Phone SIP-T38G allows remote authenticated users to execute arbitrary commands by calling the system method in the body of a request, as demonstrated by running unauthorized services, changing directory permissions, and modifying files.
Products affected by CVE-2013-5758
- cpe:2.3:h:yealink:sip-t38g:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-5758
10.71%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 93 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-5758
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.0
|
HIGH | AV:N/AC:L/Au:S/C:C/I:C/A:C |
8.0
|
10.0
|
NIST |
CWE ids for CVE-2013-5758
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-5758
-
http://www.exploit-db.com/exploits/33742
Yealink VoIP Phone SIP-T38G - Privilege Escalation - Hardware remote ExploitExploit
-
http://www.exploit-db.com/exploits/33741
Yealink VoIP Phone SIP-T38G - Remote Command Execution - Hardware remote ExploitExploit
-
http://packetstormsecurity.com/files/127096/Yealink-VoIP-Phone-SIP-T38G-Remote-Command-Execution.html
Exploit
-
http://packetstormsecurity.com/files/127093/Yealink-VoIP-Phone-SIP-T38G-Privilege-Escalation.html
Yealink VoIP Phone SIP-T38G Privilege Escalation ≈ Packet StormExploit
-
http://www.osvdb.org/108080
404 Not Found
Jump to