Grandstream GXP1600 series firmware 1.0.4.152 and below is vulnerable to authenticated remote command execution when an attacker adds an OpenVPN up script to the phone's VPN settings via the "Additional Settings" field in the web interface. When the VPN's connection is established, the user defined script is executed with root privileges.
References
Link | Resource |
---|---|
https://www.tenable.com/security/research/tra-2020-22 | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Information
Published : 2020-04-14 07:15
Updated : 2020-04-14 11:14
NVD link : CVE-2020-5739
Mitre link : CVE-2020-5739
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
grandstream
- gxp1630_firmware
- gxp1628
- gxp1625_firmware
- gxp1625
- gxp1620_firmware
- gxp1615_firmware
- gxp1620
- gxp1630
- gxp1615
- gxp1628_firmware
- gxp1610_firmware
- gxp1610