← Zuruck zu CVEs
CVE-2026-2329
CRITICAL9.8
Beschreibung
An unauthenticated stack-based buffer overflow vulnerability exists in the HTTP API endpoint /cgi-bin/api.values.get. A remote attacker can leverage this vulnerability to achieve unauthenticated remote code execution (RCE) with root privileges on a target device. The vulnerability affects all six device models in the series: GXP1610, GXP1615, GXP1620, GXP1625, GXP1628, and GXP1630.
CVE Details
CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht2/18/2026
Zuletzt geandert2/20/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
grandstream:gxp1610grandstream:gxp1610_firmwaregrandstream:gxp1615grandstream:gxp1615_firmwaregrandstream:gxp1620grandstream:gxp1620_firmwaregrandstream:gxp1625grandstream:gxp1625_firmwaregrandstream:gxp1628grandstream:gxp1628_firmwaregrandstream:gxp1630grandstream:gxp1630_firmware
Schwachen (CWE)
CWE-121
Referenzen
https://github.com/rapid7/metasploit-framework/pull/20983(cve@rapid7.com)
https://psirt.grandstream.com/(cve@rapid7.com)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.