Loading
The diagnostics web interface in the Yeahlink Ultra-elegant IP Phone SIP-T41P (firmware 66.83.0.35) does not validate (escape) the path information (path traversal), which allows an authenticated remote attacker to get access to privileged information (e.g., /etc/passwd) via path traversal (relative path information in the file parameter of the corresponding POST request).
Use CWE-22, Yealink vendor hub and Ultra-Elegant Ip Phone Sip-T41p Firmware product page to widen CVE-2018-16221 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2018-16218 and CVE-2018-16217 for nearby disclosures in the same product family.