Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66737: n/a

0
Medium
VulnerabilityCVE-2025-66737cvecve-2025-66737
Published: Fri Dec 26 2025 (12/26/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Yealink T21P_E2 Phone 52.84.0.15 is vulnerable to Directory Traversal. A remote normal privileged attacker can read arbitrary files via a crafted request result read function of the diagnostic component.

AI-Powered Analysis

AILast updated: 12/26/2025, 16:39:28 UTC

Technical Analysis

CVE-2025-66737 is a directory traversal vulnerability identified in the Yealink T21P_E2 IP phone firmware version 52.84.0.15. The flaw exists in the diagnostic component's read function, which processes requests that can be crafted to traverse directories and read arbitrary files on the device's filesystem. An attacker with normal user privileges can remotely send malicious requests to exploit this vulnerability without requiring elevated permissions or user interaction. Directory traversal vulnerabilities allow attackers to bypass intended access controls and retrieve sensitive files such as configuration files, credentials, or logs that may contain sensitive information. The Yealink T21P_E2 is a widely deployed VoIP phone model used in enterprise environments, making this vulnerability particularly concerning for organizations relying on these devices for communication. Although no public exploits or patches are currently available, the vulnerability's presence in a network-facing device increases the risk of reconnaissance and information disclosure attacks. The lack of a CVSS score complicates risk assessment, but the technical details suggest a high severity due to the potential impact on confidentiality and the ease of exploitation remotely. The vulnerability was reserved and published in December 2025, indicating recent discovery and disclosure.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive information stored on Yealink T21P_E2 phones, including configuration files, user credentials, or call logs. Such information leakage can facilitate further attacks such as credential theft, network reconnaissance, or targeted phishing campaigns. The compromise of telephony devices can also undermine the confidentiality and integrity of voice communications, potentially exposing sensitive business conversations. Organizations with large deployments of Yealink phones in sectors such as finance, government, healthcare, and critical infrastructure are at heightened risk. The remote exploitation capability without elevated privileges or user interaction increases the attack surface, especially in environments where these devices are accessible from less trusted network segments. This could lead to lateral movement within corporate networks or exposure of internal network topology. The absence of known exploits in the wild provides a window for proactive mitigation, but the lack of available patches necessitates immediate compensating controls to reduce risk.

Mitigation Recommendations

1. Immediately inventory all Yealink T21P_E2 phones in the network and identify those running firmware version 52.84.0.15. 2. Restrict network access to the management and diagnostic interfaces of these devices using network segmentation and firewall rules, limiting access only to trusted administrative hosts. 3. Disable or restrict the diagnostic component or any unnecessary services on the affected phones if possible. 4. Monitor network traffic to and from Yealink phones for suspicious or anomalous requests that may indicate exploitation attempts. 5. Implement strict access controls and authentication mechanisms for device management interfaces to prevent unauthorized access. 6. Engage with Yealink or authorized vendors to obtain firmware updates or patches addressing this vulnerability as soon as they become available. 7. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics tailored to detect directory traversal attempts targeting VoIP devices. 8. Educate IT and security teams about this vulnerability to ensure rapid response to any indicators of compromise. 9. As a longer-term measure, evaluate the security posture of VoIP devices and consider alternative solutions with stronger security guarantees if remediation is delayed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 694eb6b333784cecd47a79ae

Added to database: 12/26/2025, 4:24:19 PM

Last enriched: 12/26/2025, 4:39:28 PM

Last updated: 12/26/2025, 7:01:58 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats