First published: Sat Mar 30 2019(Updated: )
Grandstream GAC2500 1.0.3.35, GXP2200 1.0.3.27, GVC3202 1.0.3.51, GXV3275 before 1.0.3.219 Beta, and GXV3240 before 1.0.3.219 Beta devices allow unauthenticated remote code execution via shell metacharacters in a /manager?action=getlogcat priority field, in conjunction with a buffer overflow (via the phonecookie cookie) to overwrite a data structure and consequently bypass authentication. This can be exploited remotely or via CSRF because the cookie can be placed in an Accept HTTP header in an XMLHttpRequest call to lighttpd.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Grandstream Gac2500 Firmware | <=1.0.3.35 | |
Grandstream GAC2500 | ||
Grandstream Gvc3202 Firmware | <1.0.3.51 | |
Grandstream Gvc3202 | ||
Grandstream Gxv3275 Firmware | <1.0.3.219 | |
Grandstream Gxv3275 | ||
Grandstream Gxv3240 Firmware | <1.0.3.219 | |
Grandstream Gxv3240 | ||
Grandstream Gxp2200 Firmware | <=1.0.3.27 | |
Grandstream Gxp2200 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2019-10655.
CVE-2019-10655 has a severity rating of 9.8 (critical).
Grandstream GAC2500 1.0.3.35, GXP2200 1.0.3.27, GVC3202 1.0.3.51, GXV3275 before 1.0.3.219 Beta, and GXV3240 before 1.0.3.219 Beta are affected by CVE-2019-10655.
CVE-2019-10655 allows unauthenticated remote code execution via shell metacharacters in a /manager?action=getlogcat priority field, in conjunction with a buffer overflow.
There are currently no publicly available fixes for CVE-2019-10655.