CVE-2025-66738
Yealink · Yealink Multiple Products
A high-severity vulnerability has been identified in multiple Yealink VoIP phone products, specifically affecting the T21P_E2 model.
Executive summary
A high-severity vulnerability has been identified in multiple Yealink VoIP phone products, specifically affecting the T21P_E2 model. This flaw allows an unauthenticated remote attacker to execute arbitrary commands on the device, potentially leading to a complete system compromise. Successful exploitation could result in call eavesdropping, fraudulent phone usage, or the device being used as a pivot point to attack the internal network.
Vulnerability
The vulnerability is an unauthenticated command injection flaw in the web management interface of the affected devices. An attacker can send a specially crafted HTTP request to a specific administrative endpoint without needing to provide valid credentials. The device fails to properly sanitize user-supplied input within this request, allowing the attacker to inject and execute arbitrary commands on the underlying operating system with the privileges of the web server process, which is typically root.
Business impact
This vulnerability is rated as High severity with a CVSS score of 8.8, posing a significant risk to the organization. An attacker who successfully exploits this flaw can gain complete control over the VoIP phone. The potential consequences include a breach of confidentiality through eavesdropping on sensitive business calls, financial loss from unauthorized international or premium-rate calls, and reputational damage. Furthermore, a compromised phone can serve as a persistent foothold within the corporate network, enabling attackers to launch further attacks against other internal systems.
Remediation
Immediate Action: Identify all vulnerable Yealink devices on the network and apply the security updates released by the vendor immediately. After patching, monitor the devices for any signs of exploitation attempts by reviewing web access logs for unusual or malicious requests.
Proactive Monitoring: Configure network monitoring to detect anomalous outbound traffic from VoIP phones to unknown internet destinations. Review web server logs on the devices for requests to administrative pages from untrusted IP addresses or requests containing shell command syntax (e.g., semicolons, pipe characters, backticks). Implement network intrusion detection system (NIDS) rules to alert on traffic patterns matching known exploitation techniques for this CVE as they become available.
Compensating Controls: If patching cannot be performed immediately, implement network segmentation to isolate the VoIP device management interfaces from general user networks and the public internet. Use firewall rules or Access Control Lists (ACLs) to restrict access to the web management portal to only authorized administrative workstations or a dedicated management VLAN.
Exploitation status
Public Exploit Available: false
Analyst recommendation
This vulnerability represents a critical risk and must be addressed with high priority. We strongly recommend that the organization patch all affected Yealink devices immediately. Although CVE-2025-66738 is not currently listed on the CISA KEV (Known Exploited Vulnerabilities) catalog, its high CVSS score and the potential for unauthenticated remote code execution make it an attractive target for attackers. If immediate patching is not feasible, the compensating controls outlined above, particularly restricting network access to the management interface, must be implemented without delay to reduce the attack surface.