Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2013-5758 First vendor Publication 2014-08-03
Vendor Cve Last vendor Modification 2014-08-04

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:S/C:C/I:C/A:C)
Cvss Base Score 9 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 8 Authentication Requires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

cgi-bin/cgiServer.exx in Yealink VoIP Phone SIP-T38G allows remote authenticated users to execute arbitrary commands by calling the system method in the body of a request, as demonstrated by running unauthorized services, changing directory permissions, and modifying files.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5758

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-78 Improper Sanitization of Special Elements used in an OS Command ('OS Command Injection') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Hardware 1

ExploitDB Exploits

id Description
2014-06-13 Yealink VoIP Phone SIP-T38G - Privileges Escalation
2014-06-13 Yealink VoIP Phone SIP-T38G - Remote Command Execution

Snort® IPS/IDS

Date Description
2017-05-31 Yealink VoIP phone remote code execution attempt
RuleID : 42378 - Revision : 2 - Type : SERVER-OTHER

Sources (Detail)

Source Url
EXPLOIT-DB http://www.exploit-db.com/exploits/33741
http://www.exploit-db.com/exploits/33742
MISC http://packetstormsecurity.com/files/127093/Yealink-VoIP-Phone-SIP-T38G-Privi...
http://packetstormsecurity.com/files/127096/Yealink-VoIP-Phone-SIP-T38G-Remot...
OSVDB http://www.osvdb.org/108080

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
Date Informations
2021-05-04 12:27:49
  • Multiple Updates
2021-04-22 01:33:35
  • Multiple Updates
2020-05-23 00:38:26
  • Multiple Updates
2016-06-28 19:45:04
  • Multiple Updates
2014-08-04 21:23:25
  • Multiple Updates
2014-08-04 00:21:30
  • First insertion