Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:h:grandstream:gxp1620:-:*:*:*:*:*:*:*
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2020-5739 |
Grandstream GXP1600 series firmware 1.0.4.152 and below is vulnerable to authenticated remote command execution when an attacker adds an OpenVPN up script to the phone's VPN settings via the "Additional Settings" field in the web interface. When the VPN's connection is established, the user defined script is executed with root privileges. Published: April 14, 2020; 10:15:12 AM -0400 |
V3.1: 8.8 HIGH V2.0: 9.0 HIGH |
CVE-2020-5738 |
Grandstream GXP1600 series firmware 1.0.4.152 and below is vulnerable to authenticated remote command execution when an attacker uploads a specially crafted tar file to the HTTP /cgi-bin/upload_vpntar interface. Published: April 14, 2020; 10:15:11 AM -0400 |
V3.1: 8.8 HIGH V2.0: 9.0 HIGH |
CVE-2018-17565 |
Shell Metacharacter Injection in the SSH configuration interface on Grandstream GXP16xx VoIP 1.0.4.128 phones allows attackers to execute arbitrary system commands and gain a root shell. Published: April 01, 2019; 5:29:26 PM -0400 |
V3.0: 9.8 CRITICAL V2.0: 10.0 HIGH |
CVE-2018-17564 |
A Malformed Input String to /cgi-bin/delete_CA on Grandstream GXP16xx VoIP 1.0.4.128 phones allows attackers to delete configuration parameters and gain admin access to the device. Published: April 01, 2019; 5:29:26 PM -0400 |
V3.0: 9.8 CRITICAL V2.0: 7.5 HIGH |
CVE-2018-17563 |
A Malformed Input String to /cgi-bin/api-get_line_status on Grandstream GXP16xx VoIP 1.0.4.128 phones allows attackers to dump the device's configuration in cleartext. Published: April 01, 2019; 5:29:25 PM -0400 |
V3.0: 5.3 MEDIUM V2.0: 5.0 MEDIUM |