This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Grandstream First view 2019-04-01
Product gxp1630 Firmware Last view 2020-04-14
Version Type Os
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:o:grandstream:gxp1630_firmware:1.0.4.128:*:*:*:*:*:*:* 5

Related : CVE

  Date Alert Description
8.8 2020-04-14 CVE-2020-5739

Grandstream GXP1600 series firmware 1.0.4.152 and below is vulnerable to authenticated remote command execution when an attacker adds an OpenVPN up script to the phone's VPN settings via the "Additional Settings" field in the web interface. When the VPN's connection is established, the user defined script is executed with root privileges.

8.8 2020-04-14 CVE-2020-5738

Grandstream GXP1600 series firmware 1.0.4.152 and below is vulnerable to authenticated remote command execution when an attacker uploads a specially crafted tar file to the HTTP /cgi-bin/upload_vpntar interface.

9.8 2019-04-01 CVE-2018-17565

Shell Metacharacter Injection in the SSH configuration interface on Grandstream GXP16xx VoIP 1.0.4.128 phones allows attackers to execute arbitrary system commands and gain a root shell.

9.8 2019-04-01 CVE-2018-17564

A Malformed Input String to /cgi-bin/delete_CA on Grandstream GXP16xx VoIP 1.0.4.128 phones allows attackers to delete configuration parameters and gain admin access to the device.

5.3 2019-04-01 CVE-2018-17563

A Malformed Input String to /cgi-bin/api-get_line_status on Grandstream GXP16xx VoIP 1.0.4.128 phones allows attackers to dump the device's configuration in cleartext.

CWE : Common Weakness Enumeration

%idName
25% (1) CWE-311 Missing Encryption of Sensitive Data
25% (1) CWE-94 Failure to Control Generation of Code ('Code Injection')
25% (1) CWE-78 Improper Sanitization of Special Elements used in an OS Command ('O...
25% (1) CWE-59 Improper Link Resolution Before File Access ('Link Following')