← Voltar para CVEs
CVE-2026-2329
CRITICAL9.8
Descricao
An unauthenticated stack-based buffer overflow vulnerability exists in the HTTP API endpoint /cgi-bin/api.values.get. A remote attacker can leverage this vulnerability to achieve unauthenticated remote code execution (RCE) with root privileges on a target device. The vulnerability affects all six device models in the series: GXP1610, GXP1615, GXP1620, GXP1625, GXP1628, and GXP1630.
Detalhes CVE
Pontuacao CVSS v3.19.8
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado2/18/2026
Ultima modificacao2/20/2026
Fontenvd
Avistamentos honeypot0
Produtos afetados
grandstream:gxp1610grandstream:gxp1610_firmwaregrandstream:gxp1615grandstream:gxp1615_firmwaregrandstream:gxp1620grandstream:gxp1620_firmwaregrandstream:gxp1625grandstream:gxp1625_firmwaregrandstream:gxp1628grandstream:gxp1628_firmwaregrandstream:gxp1630grandstream:gxp1630_firmware
Fraquezas (CWE)
CWE-121
Referencias
https://github.com/rapid7/metasploit-framework/pull/20983(cve@rapid7.com)
https://psirt.grandstream.com/(cve@rapid7.com)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.