← Back to CVEs
CVE-2026-2329
CRITICAL9.8
Description
An unauthenticated stack-based buffer overflow vulnerability exists in the HTTP API endpoint /cgi-bin/api.values.get. A remote attacker can leverage this vulnerability to achieve unauthenticated remote code execution (RCE) with root privileges on a target device. The vulnerability affects all six device models in the series: GXP1610, GXP1615, GXP1620, GXP1625, GXP1628, and GXP1630.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published2/18/2026
Last Modified2/20/2026
Sourcenvd
Honeypot Sightings0
Affected Products
grandstream:gxp1610grandstream:gxp1610_firmwaregrandstream:gxp1615grandstream:gxp1615_firmwaregrandstream:gxp1620grandstream:gxp1620_firmwaregrandstream:gxp1625grandstream:gxp1625_firmwaregrandstream:gxp1628grandstream:gxp1628_firmwaregrandstream:gxp1630grandstream:gxp1630_firmware
Weaknesses (CWE)
CWE-121
References
https://github.com/rapid7/metasploit-framework/pull/20983(cve@rapid7.com)
https://psirt.grandstream.com/(cve@rapid7.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.