Update Time: June 12,2025
Yealink received a vulnerability report submitted to Yealink Security by an external security researcher in May 2025.We are actively processing and evaluating it according to the Yealink Vulnerability Disclosure Process (VDP), acknowledging your concerns about potential vulnerabilities. It is Yealink’s obligation to initiate proactive communication with close partners on vulnerability-related matters. Below is a detailed progress update on the vulnerability remediation:
ISSUE:
1) Firmware Unpacked Issue
Issue 1: ROM package key is lost
There is a vulnerability reported in the firmware encryption mechanism of Yealink VoIP phones. This issue is applicable on versions V86 and below. Attackers can decrypt the firmware through reverse engineering and obtain information data of the ROM file;
Issue 2: Version.bin injection issue
The Version.bin file in the ROM file has a missing security verification mechanism vulnerability, and the digital signature is not perfect. The attacker forges a ROM package file and triggers the upgrade of the device by logging into the device; during the upgrade process, the tampered Version.bin will be executed;
ANALYSIS:
Yealink Statement:
① After decrypting the ROM package file can only obtain some OEM customized information , but cannot control your device;
② The execution of Version.bin only occurs when the controller has the authority to upgrade the device . In actual scenarios, the device web backend requires an administrator password to log in, which makes it difficult for attackers to direct gain access to device upgrade permissions. In addition, devices with secure boot will be verified when they are upgraded which makes that the attack cannot be executed non-persistently.
SOLUTION:
Mitigation measures:
If you still have concerns, you can solve them by upgrading.
①Decrypting a ROM package yields only partial OEM customized information (e.g. autop url). Typically customizable information excludes user data. The default firmware is non-OEM-customized. Impact assessments may be conducted based on required customization parameters.
②Build V87 or later resolves the Version.bin execution issue. See the versions below.
Basic Information | Issue 1: ROM package key is lost | Issue 2: Version.bin injection issue | ||||
model | Solution version | Issue version | Solution version | Secure boot | ||
phone | SIP-T7X (T73U\W, T74U\W, T77U) | Not affected | NA | Not affected | NA | Y |
SIP -T85W, SIP-T87W | Not affected | NA | Not affected | NA | Y | |
DECT Phone | W75B,W75DM | Not affected | NA | Not affected | NA | Y |
Android Phone | SIP-T88W, SIP-T88V | Not affected | NA | Not affected | NA | Y |
4G phone | T74LTE | Not affected | NA | Not affected | NA | Y |
Wi-Fi IP Phone | Wi-Fi IP Phone (AX83H, AX86R) | Not affected | NA | Not affected | NA | Y |
IP Phone | SIP-T3W (T31W\T34W) | Not affected | NA | Not affected | NA | Y |
SIP-T3X (T30\T30P\T31P\T31G\T33G) | 124.86.0.60 and below | 124.87.0.15 | 124.86.0.60 and below | 124.87.0.15 | Y | |
SIP-T4X (T42U\T43U\T44U\T44W\T46U\T48U) | V86 and below | 108.87.0.15 | V86 and below | 108.87.0.15 | Y | |
SIP-T5X(T53\T53W\T54W\T57W) | V86 and below | 96.87.0.15 | V86 and below | 96.87.0.15 | Y | |
CP925 | V86 and below | 148.87.0.15 | V86 and below | 148.87.0.15 | Y | |
CP935W | V86 and below | 149.87.0.15 | V86 and below | 149.87.0.15 | Y | |
Android Phone | VP59 | V86 and below | 91.87.0.15 | V86 and below | 91.87.0.15 | Y |
T58W | V86 and below | 150.87.0.15 | V86 and below | 150.87.0.15 | Y | |
CP965 (PX30+YL2018) | V86 and below | 143.87.0.15 | V86 and below | 143.87.0.15 | Y | |
DECT Phone | W70B | V86 and below | 146.87.0.15 | V86 and below | 146.87.0.15 | Y |
W80B,W80DM | V86 and below | 103.87.0.10 | V86 and below | 103.87.0.10 | Y | |
W90B,W90DM | V86 and below | 130.87.0.10 | V86 and below | 130.87.0.10 | Y |
For information on supported versions of EOL models, please contact technical support team.
Finally, we promise that safety is Yealink’s persistent goal. We will work with you to continuously improve product safety and address any of your concerns as soon as possible.
We therefore will follow the vulnerability disclosure process to conduct a series of measures after a vulnerability is reported. Currently, we recommend that you follow the above guidelines to ensure safety in this issue.
Reported vulnerability will be disclosed on our website, see: https://www.yealink.com/en/trust-center/security-advisories