| Título | Yealink T21P_2E 52.84.0.15 Cross Site Scripting |
|---|
| Descripción | One of the normal user feature on the yealink ip phone web portal doesn't sanitized input properly that allows an authenticated attacker to execute arbitrary HTML or JavaScript code on a victims browser which has high impact to confidentiality, low impact to integrity, no impact to availability, and requires no user interaction
Report: https://drive.google.com/file/d/1vptRtEeoS1AZgnqow1yPrsgsBkw4jXc2/view?usp=sharing
Password: asdjk12342ksa |
|---|
| Usuario | cccll (UID 92824) |
|---|
| Sumisión | 2025-11-26 15:54 (hace 5 meses) |
|---|
| Moderación | 2025-12-07 18:55 (11 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 334670 [Yealink SIP-T21P E2 52.84.0.15 Local Directory Page secuencias de comandos en sitios cruzados] |
|---|
| Puntos | 17 |
|---|