FKIE_CVE-2026-2329
Vulnerability from fkie_nvd - Published: 2026-02-18 15:18 - Updated: 2026-02-20 20:57
Severity ?
Summary
An unauthenticated stack-based buffer overflow vulnerability exists in the HTTP API endpoint /cgi-bin/api.values.get. A remote attacker can leverage this vulnerability to achieve unauthenticated remote code execution (RCE) with root privileges on a target device. The vulnerability affects all six device models in the series: GXP1610, GXP1615, GXP1620, GXP1625, GXP1628, and GXP1630.
References
| URL | Tags | ||
|---|---|---|---|
| cve@rapid7.com | https://firmware.grandstream.com/Release_Note_GXP16xx_1.0.7.81.pdf | Product, Release Notes | |
| cve@rapid7.com | https://github.com/rapid7/metasploit-framework/pull/20983 | VDB Entry, Patch | |
| cve@rapid7.com | https://psirt.grandstream.com/ | Vendor Advisory | |
| cve@rapid7.com | https://www.rapid7.com/blog/post/ve-cve-2026-2329-critical-unauthenticated-stack-buffer-overflow-in-grandstream-gxp1600-voip-phones-fixed | Third Party Advisory, VDB Entry |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| grandstream | gxp1610_firmware | * | |
| grandstream | gxp1610 | - | |
| grandstream | gxp1615_firmware | * | |
| grandstream | gxp1615 | - | |
| grandstream | gxp1620_firmware | * | |
| grandstream | gxp1620 | - | |
| grandstream | gxp1625_firmware | * | |
| grandstream | gxp1625 | - | |
| grandstream | gxp1628_firmware | * | |
| grandstream | gxp1628 | - | |
| grandstream | gxp1630_firmware | * | |
| grandstream | gxp1630 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:grandstream:gxp1610_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "99246F81-B826-4D2F-9A82-629E64BF95EE",
"versionEndExcluding": "1.0.7.81",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:grandstream:gxp1610:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D92122D2-AD92-4EC3-81C3-CC58C3E3C287",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:grandstream:gxp1615_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A3D913E1-E682-454A-B6A9-9D8815E692B5",
"versionEndExcluding": "1.0.7.81",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:grandstream:gxp1615:-:*:*:*:*:*:*:*",
"matchCriteriaId": "713E836B-E61E-4E74-9026-F6470C9555F1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:grandstream:gxp1620_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "03F5647A-F0A2-44D4-AE37-36D1B26A4DD0",
"versionEndExcluding": "1.0.7.81",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:grandstream:gxp1620:-:*:*:*:*:*:*:*",
"matchCriteriaId": "898FC5BB-6D88-4ED3-95FE-ACFA8D99AAD7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:grandstream:gxp1625_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CABEDD99-B978-4818-9F7D-D53089E02BE0",
"versionEndExcluding": "1.0.7.81",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:grandstream:gxp1625:-:*:*:*:*:*:*:*",
"matchCriteriaId": "280FCCEF-196B-4BD4-B5C2-7DECC224A84C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:grandstream:gxp1628_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "627DD526-9A9A-43BE-B060-3090FF33E741",
"versionEndExcluding": "1.0.7.81",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:grandstream:gxp1628:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8CDF28C0-982E-4DB8-8F3A-75103F2AF9A4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:grandstream:gxp1630_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0F3398B8-0265-46D4-86C1-761B068424D9",
"versionEndExcluding": "1.0.7.81",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:grandstream:gxp1630:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63FC9463-51FD-493D-B2FD-4E61EC6B98CA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An unauthenticated stack-based buffer overflow vulnerability exists in the HTTP API endpoint /cgi-bin/api.values.get. A remote attacker can leverage this vulnerability to achieve unauthenticated remote code execution (RCE) with root privileges on a target device. The vulnerability affects all six device models in the series: GXP1610, GXP1615, GXP1620, GXP1625, GXP1628, and GXP1630."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer basado en pila no autenticada en el endpoint de la API HTTP /cgi-bin/api.values.get. Un atacante remoto puede aprovechar esta vulnerabilidad para lograr ejecuci\u00f3n remota de c\u00f3digo (RCE) no autenticada con privilegios de root en un dispositivo objetivo. La vulnerabilidad afecta a los seis modelos de dispositivo de la serie: GXP1610, GXP1615, GXP1620, GXP1625, GXP1628 y GXP1630."
}
],
"id": "CVE-2026-2329",
"lastModified": "2026-02-20T20:57:50.360",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cve@rapid7.com",
"type": "Secondary"
}
]
},
"published": "2026-02-18T15:18:44.173",
"references": [
{
"source": "cve@rapid7.com",
"tags": [
"Product",
"Release Notes"
],
"url": "https://firmware.grandstream.com/Release_Note_GXP16xx_1.0.7.81.pdf"
},
{
"source": "cve@rapid7.com",
"tags": [
"VDB Entry",
"Patch"
],
"url": "https://github.com/rapid7/metasploit-framework/pull/20983"
},
{
"source": "cve@rapid7.com",
"tags": [
"Vendor Advisory"
],
"url": "https://psirt.grandstream.com/"
},
{
"source": "cve@rapid7.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.rapid7.com/blog/post/ve-cve-2026-2329-critical-unauthenticated-stack-buffer-overflow-in-grandstream-gxp1600-voip-phones-fixed"
}
],
"sourceIdentifier": "cve@rapid7.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-121"
}
],
"source": "cve@rapid7.com",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…