#VU113783 Improper Certificate Validation in Yealink products - CVE-2025-52919
Published: August 8, 2025
Vulnerability identifier: #VU113783
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2025-52919
CWE-ID: CWE-295
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
SIP-T27P
SIP-T20P
SIP-T22P
SIP-T26P
T52S
T54S
RPS (Redirect and Provisioning Service)
SIP-T29G
SIP-T41P
SIP-T42G
SIP-T46G
SIP-T48G
SIP-T19P_E2
SIP-T21P_E2
SIP-T23G
SIP-T40G
SIP-T40P
SIP-T27G
SIP-T41S
SIP-T42S
SIP-T46S
SIP-T48S
SIP-CP920
SIP-T53
SIP-T53W
SIP-T54W
SIP-T57W
SIP-T56A
SIP-T58
W52P
W60B
CP960
SIP-T27P
SIP-T20P
SIP-T22P
SIP-T26P
T52S
T54S
RPS (Redirect and Provisioning Service)
SIP-T29G
SIP-T41P
SIP-T42G
SIP-T46G
SIP-T48G
SIP-T19P_E2
SIP-T21P_E2
SIP-T23G
SIP-T40G
SIP-T40P
SIP-T27G
SIP-T41S
SIP-T42S
SIP-T46S
SIP-T48S
SIP-CP920
SIP-T53
SIP-T53W
SIP-T54W
SIP-T57W
SIP-T56A
SIP-T58
W52P
W60B
CP960
Software vendor:
Yealink
Yealink
Description
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to the certificate upload function in the affected products does not properly validate certificate content. A remote user can upload invalid certificates on the system.
Remediation
Install updates from vendor's website.
External links
- https://dnip.ch/2025/06/25/yealink-voip-phones-insecurity-by-design/
- https://seclists.org/fulldisclosure/2025/Jun/20
- https://support.yealink.com/en/portal/knowledge/show?id=6476e7cd6a27da76bd06a9c9
- https://www.yealink.com/en/trust-center/security-advisories/ecb16a4993014d22
- https://www.cisa.gov/news-events/ics-advisories/icsa-25-219-08