CVE-2016-1520

The Grandstream Wave app 1.0.1.26 and earlier for Android does not use HTTPS when retrieving update information, which might allow man-in-the-middle attackers to execute arbitrary code via a crafted application.
Configurations

Configuration 1 (hide)

cpe:2.3:a:grandstream:wave:*:*:*:*:*:android:*:*

History

21 Nov 2024, 02:46

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/136291/Grandstream-Wave-1.0.1.26-Update-Redirection.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/136291/Grandstream-Wave-1.0.1.26-Update-Redirection.html - Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/archive/1/537821/100/0/threaded - () http://www.securityfocus.com/archive/1/537821/100/0/threaded -
References () https://rt-solutions.de/wp-content/uploads/2016/04/CVE-2016-1520-app-update-redirection.pdf - Third Party Advisory () https://rt-solutions.de/wp-content/uploads/2016/04/CVE-2016-1520-app-update-redirection.pdf - Third Party Advisory

Information

Published : 2017-04-21 20:59

Updated : 2024-11-21 02:46


NVD link : CVE-2016-1520

Mitre link : CVE-2016-1520

CVE.ORG link : CVE-2016-1520


JSON object : View

Products Affected

grandstream

  • wave
CWE
CWE-254

7PK - Security Features