Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
grandstream vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2024-0840
The Grandstream UCM Series IP PBX before firmware version 1.0.20.52 is affected by a parameter injection vulnerability in the HTTP interface. A remote and authenticated attacker can execute arbitrary code by sending a crafted HTTP request. Authentication may be possible using a d...
NA
CVE-2023-50015
An issue exists in Grandstream GXP14XX 1.0.8.9 and GXP16XX 1.0.7.13, allows remote malicious users to escalate privileges via incorrect access control using an end-user session-identity token.
9.8
CVSSv3
CVE-2022-2025
an attacker with knowledge of user/pass of Grandstream GSD3710 in its 1.0.11.13 version, could overflow the stack since it doesn't check the param length before use the strcopy instruction. The explotation of this vulnerability may lead an malicious user to execute a shell w...
Grandstream Gds3710 Firmware 1.0.11.13
9.8
CVSSv3
CVE-2022-2070
In Grandstream GSD3710 in its 1.0.11.13 version, it's possible to overflow the stack since it doesn't check the param length before using the sscanf instruction. Because of that, an attacker could create a socket and connect with a remote IP:port by opening a shell and ...
Grandstream Gds3710 Firmware 1.0.11.13
8.8
CVSSv3
CVE-2021-37915
An issue exists on the Grandstream HT801 Analog Telephone Adaptor prior to 1.0.29.8. From the limited configuration shell, it is possible to set the malicious gdb_debug_server variable. As a result, after a reboot, the device downloads and executes malicious scripts from an attac...
Grandstream Ht801 Firmware
1 Github repository
8.8
CVSSv3
CVE-2021-37748
Multiple buffer overflows in the limited configuration shell (/sbin/gs_config) on Grandstream HT801 devices prior to 1.0.29 allow remote authenticated users to execute arbitrary code as root via a crafted manage_if setting, thus bypassing the intended restrictions of this shell a...
Grandstream Ht801 Firmware
1 Github repository
7.2
CVSSv3
CVE-2020-25217
Grandstream GRP261x VoIP phone running firmware version 1.0.3.6 (Base) allows Command Injection as root in its administrative web interface.
Grandstream Grp2612 Firmware 1.0.3.6
Grandstream Grp2612p Firmware 1.0.3.6
Grandstream Grp2612w Firmware 1.0.3.6
Grandstream Grp2613 Firmware 1.0.3.6
Grandstream Grp2614 Firmware 1.0.3.6
Grandstream Grp2615 Firmware 1.0.3.6
Grandstream Grp2616 Firmware 1.0.3.6
9.8
CVSSv3
CVE-2020-25218
Grandstream GRP261x VoIP phone running firmware version 1.0.3.6 (Base) allow Authentication Bypass in its administrative web interface.
Grandstream Grp2612 Firmware 1.0.3.6
Grandstream Grp2612p Firmware 1.0.3.6
Grandstream Grp2612w Firmware 1.0.3.6
Grandstream Grp2613 Firmware 1.0.3.6
Grandstream Grp2614 Firmware 1.0.3.6
Grandstream Grp2615 Firmware 1.0.3.6
Grandstream Grp2616 Firmware 1.0.3.6
7.8
CVSSv3
CVE-2020-5760
Grandstream HT800 series firmware version 1.0.17.5 and below is vulnerable to an OS command injection vulnerability. Unauthenticated remote attackers can execute arbitrary commands as root by crafting a special configuration file and sending a crafted SIP message.
Grandstream Ht801 Firmware
Grandstream Ht802 Firmware
Grandstream Ht812 Firmware
Grandstream Ht814 Firmware
Grandstream Ht818 Firmware
Grandstream Ht813 Firmware
7.5
CVSSv3
CVE-2020-5761
Grandstream HT800 series firmware version 1.0.17.5 and below is vulnerable to CPU exhaustion due to an infinite loop in the TR-069 service. Unauthenticated remote attackers can trigger this case by sending a one character TCP message to the TR-069 service.
Grandstream Ht801 Firmware
Grandstream Ht802 Firmware
Grandstream Ht812 Firmware
Grandstream Ht814 Firmware
Grandstream Ht818 Firmware
Grandstream Ht813 Firmware
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3080
log injection
CVE-2024-6041
CVE-2024-37661
XML external entity
CVE-2024-0845
privilege escalation
CVE-2023-37057
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »