Grandstream GXP1600 VoIP Phones Exposed to Unauthenticated Remote Code Execution
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读用户提供的文章内容,了解主要信息。 文章讲的是Grandstream GXP1600系列VoIP电话的一个严重安全漏洞。漏洞编号是CVE-2026-2329,CVSS评分9.3分,属于未认证的栈溢出,可能导致远程代码执行。攻击者可以通过构造特定的HTTP请求触发漏洞,获取root权限,并进一步窃取凭证或控制设备。受影响的型号包括GXP1610、GXP1615等,已经通过固件更新修复。 接下来,我需要将这些关键点浓缩到100字以内。要包括漏洞名称、影响、攻击方式、后果以及修复情况。同时,避免使用“文章内容总结”之类的开头语。 可能会这样组织语言:Grandstream GXP1600系列VoIP电话被发现严重漏洞(CVE-2026-2329),可导致远程代码执行和设备控制。攻击者利用未认证的栈溢出获取root权限,并窃取凭证或重配设备使用恶意SIP代理。该漏洞已通过固件更新修复。 检查字数是否在限制内,并确保信息准确无误。 </think> Grandstream GXP1600系列VoIP电话被发现严重漏洞(CVE-2026-2329),可导致远程代码执行和设备控制。攻击者利用未认证的栈溢出获取root权限,并窃取凭证或重配设备使用恶意SIP代理。该漏洞已通过固件更新修复。 2026-2-18 16:35:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

Network Security / Enterprise Security

Cybersecurity researchers have disclosed a critical security flaw in the Grandstream GXP1600 series of VoIP phones that could allow an attacker to seize control of susceptible devices.

The vulnerability, tracked as CVE-2026-2329, carries a CVSS score of 9.3 out of a maximum of 10.0. It has been described as a case of unauthenticated stack-based buffer overflow that could result in remote code execution.

"A remote attacker can leverage CVE-2026-2329 to achieve unauthenticated remote code execution (RCE) with root privileges on a target device," Rapid7 researcher Stephen Fewer, who discovered and reported the bug on January 6, 2026, said.

According to the cybersecurity company, the issue is rooted in the device's web-based API service ("/cgi-bin/api.values.get") and is accessible in a default configuration without requiring authentication.

This endpoint is designed to fetch one or more configuration values from the phone, such as the firmware version number or the model, through a colon-delimited string in the "request" parameter (e.g., "request=68:phone_model"), which is then parsed to extract each identifier and append it to a 64 byte buffer on the stack.

"When appending another character to the small 64 byte buffer, no length check is performed to ensure that no more than 63 characters (plus the appended null terminator) are ever written to this buffer," Fewer explained. "Therefore, an attacker-controlled 'request' parameter can write past the bounds of the small 64 byte buffer on the stack, overflowing into adjacent stack memory."

This means that a malicious colon-delimited "request" parameter sent as part of an HTTP request to the "/cgi-bin/api.values.get" endpoint can be used to trigger a stack-based buffer overflow, allowing the threat actors to corrupt the stack contents and ultimately achieve remote code execution on the underlying operating system.

The vulnerability affects GXP1610, GXP1615, GXP1620, GXP1625, GXP1628, and GXP1630 models. It has been addressed as part of a firmware update (version 1.0.7.81) released late last month.

In a Metasploit exploit module developed by Rapid7, it has been demonstrated that the vulnerability could be exploited to gain root privileges on a vulnerable device and chain it with a post-exploitation component to extract credentials stored on a compromised device.

Furthermore, the remote code execution capabilities can be weaponized to reconfigure the target device to use a malicious Session Initiation Protocol (SIP) proxy, effectively enabling the attacker to intercept phone calls to and from the device and eavesdrop on VoIP conversations. A SIP proxy is an intermediary server in VoIP networks to establish and manage voice/video calls between endpoints.

"This isn't a one-click exploit with fireworks and a victory banner," Rapid7's Douglas McKee said. "But the underlying vulnerability lowers the barrier in a way that should concern anyone operating these devices in exposed or lightly-segmented environments."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/grandstream-gxp1600-voip-phones-exposed.html
如有侵权请联系:admin#unsafe.sh