#VU113782 Incorrect User Management in Yealink products - CVE-2025-52918
Published: August 8, 2025
Vulnerability identifier: #VU113782
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2025-52918
CWE-ID: CWE-286
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
SIP-T27P
SIP-T20P
SIP-T22P
SIP-T26P
T52S
T54S
RPS (Redirect and Provisioning Service)
SIP-T29G
SIP-T41P
SIP-T42G
SIP-T46G
SIP-T48G
SIP-T19P_E2
SIP-T21P_E2
SIP-T23G
SIP-T40G
SIP-T40P
SIP-T27G
SIP-T41S
SIP-T42S
SIP-T46S
SIP-T48S
SIP-CP920
SIP-T53
SIP-T53W
SIP-T54W
SIP-T57W
SIP-T56A
SIP-T58
W52P
W60B
CP960
SIP-T27P
SIP-T20P
SIP-T22P
SIP-T26P
T52S
T54S
RPS (Redirect and Provisioning Service)
SIP-T29G
SIP-T41P
SIP-T42G
SIP-T46G
SIP-T48G
SIP-T19P_E2
SIP-T21P_E2
SIP-T23G
SIP-T40G
SIP-T40P
SIP-T27G
SIP-T41S
SIP-T42S
SIP-T46S
SIP-T48S
SIP-CP920
SIP-T53
SIP-T53W
SIP-T54W
SIP-T57W
SIP-T56A
SIP-T58
W52P
W60B
CP960
Software vendor:
Yealink
Yealink
Description
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to the affected products fail to enforce access restrictions on OpenAPIs for frozen enterprise accounts. A remote user can gain access to deactivated interfaces.
Remediation
Install updates from vendor's website.
External links
- https://dnip.ch/2025/06/25/yealink-voip-phones-insecurity-by-design/
- https://seclists.org/fulldisclosure/2025/Jun/20
- https://support.yealink.com/en/portal/knowledge/show?id=646b44278ef325311f38303f
- https://www.yealink.com/en/trust-center/security-advisories/1318c5efb82e4526
- https://www.cisa.gov/news-events/ics-advisories/icsa-25-219-08