config/.htpasswd in Yealink IP Phone SIP-T38G has a hardcoded password of (1) user (s7C9Cx.rLsWFA) for the user account, (2) admin (uoCbM.VEiKQto) for the admin account, and (3) var (jhl3iZAe./qXM) for the var account, which makes it easier for remote attackers to obtain access via unspecified vectors.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
http://www.exploit-db.com/exploits/33739 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T17:22:30.892Z
Reserved: 2013-09-18T00:00:00
Link: CVE-2013-5755

No data.

Status : Modified
Published: 2014-07-16T14:19:02.823
Modified: 2024-11-21T01:58:03.420
Link: CVE-2013-5755

No data.