Vulnerability Description
config/.htpasswd in Yealink IP Phone SIP-T38G has a hardcoded password of (1) user (s7C9Cx.rLsWFA) for the user account, (2) admin (uoCbM.VEiKQto) for the admin account, and (3) var (jhl3iZAe./qXM) for the var account, which makes it easier for remote attackers to obtain access via unspecified vectors.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Yealink | Sip-T38G | - |
Related Weaknesses (CWE)
References
FAQ
What is CVE-2013-5755?
CVE-2013-5755 is a vulnerability with a CVSS score of 10.0 (HIGH). config/.htpasswd in Yealink IP Phone SIP-T38G has a hardcoded password of (1) user (s7C9Cx.rLsWFA) for the user account, (2) admin (uoCbM.VEiKQto) for the admin account, and (3) var (jhl3iZAe./qXM) fo...
How severe is CVE-2013-5755?
CVE-2013-5755 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-5755?
Check the references section above for vendor advisories and patch information. Affected products include: Yealink Sip-T38G.