The Grandstream Wave app 1.0.1.26 and earlier for Android does not use HTTPS when retrieving update information, which might allow man-in-the-middle attackers to execute arbitrary code via a crafted application.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/136291/Grandstream-Wave-1.0.1.26-Update-Redirection.html | Third Party Advisory VDB Entry |
http://www.securityfocus.com/archive/1/537821/100/0/threaded | |
https://rt-solutions.de/wp-content/uploads/2016/04/CVE-2016-1520-app-update-redirection.pdf | Third Party Advisory |
http://packetstormsecurity.com/files/136291/Grandstream-Wave-1.0.1.26-Update-Redirection.html | Third Party Advisory VDB Entry |
http://www.securityfocus.com/archive/1/537821/100/0/threaded | |
https://rt-solutions.de/wp-content/uploads/2016/04/CVE-2016-1520-app-update-redirection.pdf | Third Party Advisory |
Configurations
History
21 Nov 2024, 02:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/136291/Grandstream-Wave-1.0.1.26-Update-Redirection.html - Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/archive/1/537821/100/0/threaded - | |
References | () https://rt-solutions.de/wp-content/uploads/2016/04/CVE-2016-1520-app-update-redirection.pdf - Third Party Advisory |
Information
Published : 2017-04-21 20:59
Updated : 2024-11-21 02:46
NVD link : CVE-2016-1520
Mitre link : CVE-2016-1520
CVE.ORG link : CVE-2016-1520
JSON object : View
Products Affected
grandstream
- wave
CWE
CWE-254
7PK - Security Features