Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 09 Jan 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Yealink sip-t21\(p\)e2
Yealink sip-t21\(p\)e2 Firmware |
|
| CPEs | cpe:2.3:h:yealink:sip-t21\(p\)e2:-:*:*:*:*:*:*:* cpe:2.3:o:yealink:sip-t21\(p\)e2_firmware:52.84.0.15:*:*:*:*:*:*:* |
|
| Vendors & Products |
Yealink sip-t21\(p\)e2
Yealink sip-t21\(p\)e2 Firmware |
Mon, 29 Dec 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Yealink
Yealink ip Phone Sip-t21p Yealink sip-t21p E2 |
|
| Vendors & Products |
Yealink
Yealink ip Phone Sip-t21p Yealink sip-t21p E2 |
Sat, 27 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 26 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-23 | |
| Metrics |
cvssV3_1
|
Fri, 26 Dec 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Yealink T21P_E2 Phone 52.84.0.15 is vulnerable to Directory Traversal. A remote normal privileged attacker can read arbitrary files via a crafted request result read function of the diagnostic component. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-12-27T15:32:56.787Z
Reserved: 2025-12-08T00:00:00.000Z
Link: CVE-2025-66737
Updated: 2025-12-26T16:39:05.946Z
Status : Analyzed
Published: 2025-12-26T17:15:44.090
Modified: 2026-01-09T20:35:06.457
Link: CVE-2025-66737
No data.
OpenCVE Enrichment
Updated: 2025-12-29T23:04:07Z