Vulnerabilities > CVE-2013-5755 - Credentials Management vulnerability in Yealink Sip-T38G
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
config/.htpasswd in Yealink IP Phone SIP-T38G has a hardcoded password of (1) user (s7C9Cx.rLsWFA) for the user account, (2) admin (uoCbM.VEiKQto) for the admin account, and (3) var (jhl3iZAe./qXM) for the var account, which makes it easier for remote attackers to obtain access via unspecified vectors.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Hardware | 1 |
Common Weakness Enumeration (CWE)
Exploit-Db
description | Yealink VoIP Phone SIP-T38G - Default Credentials. CVE-2013-5755. Remote exploit for hardware platform |
file | exploits/hardware/remote/33739.txt |
id | EDB-ID:33739 |
last seen | 2016-02-03 |
modified | 2014-06-13 |
platform | hardware |
port | |
published | 2014-06-13 |
reporter | Mr.Un1k0d3r |
source | https://www.exploit-db.com/download/33739/ |
title | Yealink VoIP Phone SIP-T38G - Default Credentials |
type | remote |
Packetstorm
data source https://packetstormsecurity.com/files/download/127094/yealinksipt38g-credentials.txt id PACKETSTORM:127094 last seen 2016-12-05 published 2014-06-13 reporter Mr.Un1k0d3r source https://packetstormsecurity.com/files/127094/Yealink-VoIP-Phone-SIP-T38G-Default-Credentials.html title Yealink VoIP Phone SIP-T38G Default Credentials data source https://packetstormsecurity.com/files/download/127096/yealinksipt38g-exec.txt id PACKETSTORM:127096 last seen 2016-12-05 published 2014-06-13 reporter Mr.Un1k0d3r source https://packetstormsecurity.com/files/127096/Yealink-VoIP-Phone-SIP-T38G-Remote-Command-Execution.html title Yealink VoIP Phone SIP-T38G Remote Command Execution
Seebug
bulletinFamily exploit description No description provided by source. id SSV:86932 last seen 2017-11-19 modified 2014-07-01 published 2014-07-01 reporter Root source https://www.seebug.org/vuldb/ssvid-86932 title Yealink VoIP Phone SIP-T38G - Remote Command Execution bulletinFamily exploit description No description provided by source. id SSV:86930 last seen 2017-11-19 modified 2014-07-01 published 2014-07-01 reporter Root source https://www.seebug.org/vuldb/ssvid-86930 title Yealink VoIP Phone SIP-T38G - Default Credentials