Yealink Meeting Server before v26.0.0.66 was discovered to contain an OS command injection vulnerability via the file upload interface.
References
| Link | Resource |
|---|---|
| https://www.yealink.com/en/trust-center/security-advisories/2f2b990211c440cf | Vendor Advisory |
Configurations
History
05 Sep 2024, 12:57
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| CPE | cpe:2.3:a:yealink:yealink_meeting_server:*:*:*:*:*:*:*:* | |
| References | () https://www.yealink.com/en/trust-center/security-advisories/2f2b990211c440cf - Vendor Advisory | |
| CWE | CWE-78 | |
| First Time |
Yealink yealink Meeting Server
Yealink |
08 Feb 2024, 06:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-02-08 06:15
Updated : 2024-09-05 12:57
NVD link : CVE-2024-24091
Mitre link : CVE-2024-24091
JSON object : View
Products Affected
yealink
- yealink_meeting_server
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
