Directory Traversal vulnerability in Yealink VP59 v.91.15.0.118 allows a physically proximate attacker to obtain sensitive information via terms of use function in the company portal component.
References
| Link | Resource |
|---|---|
| https://medium.com/%40deepsahu1/cve-2024-28442-yealink-ip-phone-webview-escape-leads-to-sensitive-file-disclosure-via-directory-686ef8f80227 | Exploit Third Party Advisory Permissions Required |
| https://www.yealink.com/en/product-detail/ip-phone-vp59 | Product |
| https://medium.com/%40deepsahu1/cve-2024-28442-yealink-ip-phone-webview-escape-leads-to-sensitive-file-disclosure-via-directory-686ef8f80227 | Exploit Third Party Advisory Permissions Required |
| https://www.yealink.com/en/product-detail/ip-phone-vp59 | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2024-03-26 20:15
Updated : 2025-07-30 00:24
NVD link : CVE-2024-28442
Mitre link : CVE-2024-28442
CVE.ORG link : CVE-2024-28442
JSON object : View
Products Affected
yealink
- vp59
- vp59_firmware
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
