Condorlab

Yealink VoIP Phone SIP-T38G – Privileges Escalation

Advisory ID RSN-UT-0011 Vulnerability Information The file cgi-bin/cgiServer.exx in Yealink VoIP Phone SIP-T38G allows remote authenticated users to execute arbitrary commands by calling the system method in the body of a request, as dem...

Yealink VoIP Phone SIP-T38G – Local File Inclusion

Advisory ID RSN-UT-0010 Vulnerability Information Directory traversal vulnerability in Yealink VoIP Phone SIP-T38G allows remote authenticated users to read arbitrary files via a . (dot dot) in the page parameter to cgi-bin/cgiServer.exx...

Yealink VoIP Phone SIP-T38G – Default Credentials

Advisory ID RSN-UT-0009 Vulnerability Information The file config/.htpasswd in Yealink IP Phone SIP-T38G has a hardcoded password of (1) user (s7C9Cx.rLsWFA) for the user account, (2) admin (uoCbM.VEiKQto) for the admin account, and (3) ...

Juniper Junos Denial of Service Vulnerability

Advisory ID RSN-OS-0007 Vulnerability Information On SRX Series devices, when SIP ALG is enabled, a certain crafted SIP packet may cause the flowd process to crash. Repeated crashes of the flowd process constitutes an extended denial of ...

Heap Overflow in Kamailio SEAS Module

Advisory ID RSN-SS-001 Vulnerability Information The heap overflow can be triggered if Kamailio is configured to use the SEAS module, more specifically if Kamailio calls the module’s single exported function as_relay_t(). The heap over...

DoS in Asterisk chan_sip

Advisory ID RSN-OS-0011 Vulnerability Information Setting the sip.conf timert1 value to a value higher than 1245 can cause an integer overflow and result in large retransmit timeout times. These large timeout values hold system file desc...