Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 09 Jan 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Yealink sip-t21\(p\)e2
Yealink sip-t21\(p\)e2 Firmware |
|
| CPEs | cpe:2.3:h:yealink:sip-t21\(p\)e2:-:*:*:*:*:*:*:* cpe:2.3:o:yealink:sip-t21\(p\)e2_firmware:52.84.0.15:*:*:*:*:*:*:* |
|
| Vendors & Products |
Yealink sip-t21\(p\)e2
Yealink sip-t21\(p\)e2 Firmware |
Mon, 29 Dec 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Yealink
Yealink ip Phone Sip-t21p Yealink sip-t21p E2 |
|
| Vendors & Products |
Yealink
Yealink ip Phone Sip-t21p Yealink sip-t21p E2 |
Sat, 27 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 26 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-77 | |
| Metrics |
cvssV3_1
|
Fri, 26 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue in Yealink T21P_E2 Phone 52.84.0.15 allows a remote normal privileged attacker to execute arbitrary code via a crafted request the ping function of the diagnostic component. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-12-27T15:34:23.693Z
Reserved: 2025-12-08T00:00:00.000Z
Link: CVE-2025-66738
Updated: 2025-12-26T16:23:18.526Z
Status : Analyzed
Published: 2025-12-26T16:15:44.260
Modified: 2026-01-09T20:45:18.703
Link: CVE-2025-66738
No data.
OpenCVE Enrichment
Updated: 2025-12-29T23:04:09Z