Yealink T21P_E2 Phone 52.84.0.15 is vulnerable to Directory Traversal. A remote normal privileged attacker can read arbitrary files via a crafted request result read function of the diagnostic component.
CVSS
4.3
MEDIUM
Published
Dec 26, 2025
Vendor coverage
Track published CVEs, severity trends, and remediation context for yealink products.
Search results
Showing 1-24 of 24 vulnerabilities.
Yealink T21P_E2 Phone 52.84.0.15 is vulnerable to Directory Traversal. A remote normal privileged attacker can read arbitrary files via a crafted request result read function of the diagnostic component.
CVSS
4.3
MEDIUM
Published
Dec 26, 2025
An issue in Yealink T21P_E2 Phone 52.84.0.15 allows a remote normal privileged attacker to execute arbitrary code via a crafted request the ping function of the diagnostic component.
CVSS
8.8
HIGH
Published
Dec 26, 2025
Yealink Meeting Server before V26.0.0.67 allows attackers to obtain static key information from a front-end JS file and decrypt the plaintext passwords based on the obtained key information.
CVSS
7.5
HIGH
Published
Nov 1, 2024
Yealink Meeting Server before V26.0.0.67 is vulnerable to sensitive data exposure in the server response via sending HTTP request with enterprise ID.
CVSS
7.5
HIGH
Published
Nov 1, 2024
Directory Traversal in the web interface of the Tiptel IP 286 with firmware version 2.61.13.10 allows attackers to overwrite arbitrary files on the phone via the Ringtone upload function.
CVSS
9.9
CRITICAL
Published
Sep 19, 2024
An issue in Yealink VP59 Microsoft Teams Phone firmware 91.15.0.118 (fixed in 122.15.0.142) allows a physically proximate attacker to disable the phone lock via the Walkie Talkie menu option.
CVSS
2.1
LOW
Published
Apr 29, 2024
An issue discovered in Yealink VP59 Teams Editions with firmware version 91.15.0.118 allows a physically proximate attacker to gain control of an account via a flaw in the factory reset procedure.
CVSS
6.8
MEDIUM
Published
Apr 25, 2024
Directory Traversal vulnerability in Yealink VP59 v.91.15.0.118 allows a physically proximate attacker to obtain sensitive information via terms of use function in the company portal component.
CVSS
7.5
HIGH
Published
Mar 26, 2024
An issue was discovered in Yealink Configuration Encrypt Tool (AES version) and Yealink Configuration Encrypt Tool (RSA version before 1.2). There is a single hardcoded key (used to encrypt provisioning documents) across customers' installations.
Affected vendor
yealinkAffected product
configuration encryption toolCoverage
2 affected product entries
CVSS
9.8
CRITICAL
Published
Feb 23, 2024
Yealink Config Encrypt Tool add RSA before 1.2 has a built-in RSA key pair, and thus there is a risk of decryption by an adversary.
Affected vendor
yealinkAffected product
configuration encryption toolCoverage
Single affected product entry
CVSS
7.5
HIGH
Published
Feb 20, 2024
Yealink Meeting Server before v26.0.0.66 was discovered to contain an OS command injection vulnerability via the file upload interface.
CVSS
9.8
CRITICAL
Published
Feb 8, 2024
An issue in YeaLinkSIP-T19P-E2 v.53.84.0.15 allows a remote privileged attacker to execute arbitrary code via a crafted request the ping function of the diagnostic component.
CVSS
8.8
HIGH
Published
Oct 17, 2023
Directory Traversal vulnerability in Contacts File Upload Interface in Yealink W60B version 77.83.0.85, allows attackers to gain sensitive information and cause a denial of service (DoS).
CVSS
9.1
CRITICAL
Published
Aug 22, 2023
Yealink Device Management (DM) 3.6.0.20 allows command injection as root via the /sm/api/v1/firewall/zone/services URI, without authentication.
CVSS
9.8
CRITICAL
Published
Oct 15, 2021
The diagnostics web interface in the Yeahlink Ultra-elegant IP Phone SIP-T41P (firmware 66.83.0.35) does not validate (escape) the path information (path traversal), which allows an authenticated remote attacker to get access to privileged information (e.g., /etc/passwd) via path traversal (relative path information in the file parameter of the corresponding POST request).
Affected vendor
yealinkAffected product
ultra-elegant ip phone sip-t41p firmwareCoverage
Single affected product entry
CVSS
8.0
HIGH
Published
May 29, 2019
A CSRF (Cross Site Request Forgery) in the web interface of the Yeahlink Ultra-elegant IP Phone SIP-T41P firmware version 66.83.0.35 allows a remote attacker to trigger code execution or settings modification on the device by providing a crafted link to the victim.
Affected vendor
yealinkAffected product
ultra-elegant ip phone sip-t41p firmwareCoverage
Single affected product entry
CVSS
8.8
HIGH
Published
May 29, 2019
The network diagnostic function (ping) in the Yeahlink Ultra-elegant IP Phone SIP-T41P (firmware 66.83.0.35) allows a remote authenticated attacker to trigger OS commands or open a reverse shell via command injection.
Affected vendor
yealinkAffected product
ultra-elegant ip phone sip-t41p firmwareCoverage
Single affected product entry
CVSS
8.8
HIGH
Published
May 29, 2019
Multiple cross-site scripting (XSS) vulnerabilities in Local Phone book and Blacklist form in Yealink VOIP Phones allow remote authenticated users to inject arbitrary web script or HTML via the user field to cgi-bin/ConfigManApp.com.
Affected vendor
yealinkAffected product
gigabit color ip phone sip-t32gCoverage
14 affected product entries
CVSS
3.5
UNKNOWN
Published
Sep 17, 2014
cgi-bin/cgiServer.exx in Yealink VoIP Phone SIP-T38G allows remote authenticated users to execute arbitrary commands by calling the system method in the body of a request, as demonstrated by running unauthorized services, changing directory permissions, and modifying files.
CVSS
9.0
UNKNOWN
Published
Aug 3, 2014
Absolute path traversal vulnerability in Yealink VoIP Phone SIP-T38G allows remote authenticated users to read arbitrary files via a full pathname in the dumpConfigFile function in the command parameter to cgi-bin/cgiServer.exx.
CVSS
4.0
UNKNOWN
Published
Aug 3, 2014
Directory traversal vulnerability in Yealink VoIP Phone SIP-T38G allows remote authenticated users to read arbitrary files via a .. (dot dot) in the page parameter to cgi-bin/cgiServer.exx.
CVSS
4.0
UNKNOWN
Published
Aug 3, 2014
CRLF injection vulnerability in Yealink VoIP Phones with firmware 28.72.0.2 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the model parameter to servlet.
CVSS
5.0
UNKNOWN
Published
Jul 16, 2014
config/.htpasswd in Yealink IP Phone SIP-T38G has a hardcoded password of (1) user (s7C9Cx.rLsWFA) for the user account, (2) admin (uoCbM.VEiKQto) for the admin account, and (3) var (jhl3iZAe./qXM) for the var account, which makes it easier for remote attackers to obtain access via unspecified vectors.
CVSS
10.0
UNKNOWN
Published
Jul 16, 2014
Cross-site scripting (XSS) vulnerability in Yealink VoIP Phones with firmware 28.72.0.2 allows remote attackers to inject arbitrary web script or HTML via the model parameter to servlet.
CVSS
4.3
UNKNOWN
Published
Jun 16, 2014