Yealink T21P_E2 Phone 52.84.0.15 is vulnerable to Directory Traversal. A remote normal privileged attacker can read arbitrary files via a crafted request result read function of the diagnostic component.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 09 Jan 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Yealink sip-t21\(p\)e2
Yealink sip-t21\(p\)e2 Firmware
CPEs cpe:2.3:h:yealink:sip-t21\(p\)e2:-:*:*:*:*:*:*:*
cpe:2.3:o:yealink:sip-t21\(p\)e2_firmware:52.84.0.15:*:*:*:*:*:*:*
Vendors & Products Yealink sip-t21\(p\)e2
Yealink sip-t21\(p\)e2 Firmware

Mon, 29 Dec 2025 23:15:00 +0000

Type Values Removed Values Added
First Time appeared Yealink
Yealink ip Phone Sip-t21p
Yealink sip-t21p E2
Vendors & Products Yealink
Yealink ip Phone Sip-t21p
Yealink sip-t21p E2

Sat, 27 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 26 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-23
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 26 Dec 2025 16:30:00 +0000

Type Values Removed Values Added
Description Yealink T21P_E2 Phone 52.84.0.15 is vulnerable to Directory Traversal. A remote normal privileged attacker can read arbitrary files via a crafted request result read function of the diagnostic component.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-12-27T15:32:56.787Z

Reserved: 2025-12-08T00:00:00.000Z

Link: CVE-2025-66737

cve-icon Vulnrichment

Updated: 2025-12-26T16:39:05.946Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-26T17:15:44.090

Modified: 2026-01-09T20:35:06.457

Link: CVE-2025-66737

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-29T23:04:07Z

Weaknesses