#VU113780 Improper Restriction of Excessive Authentication Attempts in Yealink products - CVE-2025-52916
Published: August 8, 2025
Vulnerability identifier: #VU113780
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2025-52916
CWE-ID: CWE-307
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
SIP-T27P
SIP-T20P
SIP-T22P
SIP-T26P
T52S
T54S
RPS (Redirect and Provisioning Service)
SIP-T29G
SIP-T41P
SIP-T42G
SIP-T46G
SIP-T48G
SIP-T19P_E2
SIP-T21P_E2
SIP-T23G
SIP-T40G
SIP-T40P
SIP-T27G
SIP-T41S
SIP-T42S
SIP-T46S
SIP-T48S
SIP-CP920
SIP-T53
SIP-T53W
SIP-T54W
SIP-T57W
SIP-T56A
SIP-T58
W52P
W60B
CP960
SIP-T27P
SIP-T20P
SIP-T22P
SIP-T26P
T52S
T54S
RPS (Redirect and Provisioning Service)
SIP-T29G
SIP-T41P
SIP-T42G
SIP-T46G
SIP-T48G
SIP-T19P_E2
SIP-T21P_E2
SIP-T23G
SIP-T40G
SIP-T40P
SIP-T27G
SIP-T41S
SIP-T42S
SIP-T46S
SIP-T48S
SIP-CP920
SIP-T53
SIP-T53W
SIP-T54W
SIP-T57W
SIP-T56A
SIP-T58
W52P
W60B
CP960
Software vendor:
Yealink
Yealink
Description
The vulnerability allows a remote user to compromise the target system.
The vulnerability exists due to improper restriction of excessive authentication attempts. A remote administrator can conduct brute force attacks to gain access to sensitive information.
Remediation
Install updates from vendor's website.
External links
- https://dnip.ch/2025/06/25/yealink-voip-phones-insecurity-by-design/
- https://seclists.org/fulldisclosure/2025/Jun/20
- https://support.yealink.com/en/portal/knowledge/show?id=6476e7cd6a27da76bd06a9c9
- https://www.yealink.com/en/trust-center/security-advisories/b8dc062eaa8d4f59
- https://www.cisa.gov/news-events/ics-advisories/icsa-25-219-08