Yealink – Yealink Phones HTTP Response Splitting Vulnerability

Advisory ID


Vulnerability Information


Yealink VoIP Phones firmware and hardware are vulnerable; other versions may also be affected.  For more information on the affected versions, CVE-2014-3427 was assigned for this bug.

Release Date





The UCTM solution from RedShift Networks provides the industry’s first complete security solution developed to secure VOIP networks, endpoints and applications. His research team is constantly looking for new attack patterns, advanced penetration testing methods, vulnerability identification and deployment of new signatures for constantly subscribed clients. For more information visit

External Resources


Common Vulnerabilities and Exposures (CVE)