Description
config/.htpasswd in Yealink IP Phone SIP-T38G has a hardcoded password of (1) user (s7C9Cx.rLsWFA) for the user account, (2) admin (uoCbM.VEiKQto) for the admin account, and (3) var (jhl3iZAe./qXM) for the var account, which makes it easier for remote attackers to obtain access via unspecified vectors.
Published: 2014-07-16
Score: 10.0 Critical
EPSS: 15.4% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

No history.

Subscriptions

Yealink Sip-t38g
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T17:22:30.892Z

Reserved: 2013-09-18T00:00:00.000Z

Link: CVE-2013-5755

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-07-16T14:19:02.823

Modified: 2025-04-12T10:46:40.837

Link: CVE-2013-5755

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses