This CPE summary could be partial or incomplete. Please contact us for a detailed listing.
Summary
Detail | |||
---|---|---|---|
Vendor | Grandstream | First view | 2020-03-23 |
Product | ucm6200 Firmware | Last view | 2020-03-23 |
Version | * | Type | Os |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:grandstream:ucm6200_firmware |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
9.8 | 2020-03-23 | CVE-2020-5722 | The HTTP interface of the Grandstream UCM6200 series is vulnerable to an unauthenticated remote SQL injection via crafted HTTP request. An attacker can use this vulnerability to execute shell commands as root on versions before 1.0.19.20 or inject HTML in password recovery emails in versions before 1.0.20.17. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
100% (1) | CWE-89 | Improper Sanitization of Special Elements used in an SQL Command ('... |
Snort® IPS/IDS
Date | Description |
---|---|
2020-06-10 | Grandstream UCM6200 series SQL injection attempt RuleID : 53885 - Type : SERVER-WEBAPP - Revision : 2 |
2020-06-10 | Grandstream UCM6202 series SQL injection attempt RuleID : 53859 - Type : SERVER-WEBAPP - Revision : 2 |
2020-06-10 | Grandstream UCM6202 series SQL injection attempt RuleID : 53858 - Type : SERVER-WEBAPP - Revision : 2 |
2020-06-10 | Grandstream UCM6202 series SQL injection attempt RuleID : 53857 - Type : SERVER-WEBAPP - Revision : 2 |