Grandstream GXP1600 series firmware 1.0.4.152 and below is vulnerable to authenticated remote command execution when an attacker adds an OpenVPN up script to the phone's VPN settings via the "Additional Settings" field in the web interface. When the VPN's connection is established, the user defined script is executed with root privileges.
References
Link | Resource |
---|---|
https://www.tenable.com/security/research/tra-2020-22 | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
History
No history.
Information
Published : 2020-04-14 14:15
Updated : 2024-02-04 21:00
NVD link : CVE-2020-5739
Mitre link : CVE-2020-5739
CVE.ORG link : CVE-2020-5739
JSON object : View
Products Affected
grandstream
- gxp1628
- gxp1615_firmware
- gxp1620_firmware
- gxp1620
- gxp1610
- gxp1630_firmware
- gxp1625
- gxp1615
- gxp1610_firmware
- gxp1628_firmware
- gxp1630
- gxp1625_firmware
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')