Exploited
CWE
89
Advisory Published
Updated

CVE-2020-5722: Grandstream Networks UCM6200 Series SQL Injection Vulnerability

First published: Mon Mar 23 2020(Updated: )

The HTTP interface of the Grandstream UCM6200 series is vulnerable to an unauthenticated remote SQL injection via crafted HTTP request. An attacker can use this vulnerability to execute shell commands as root on versions before 1.0.19.20 or inject HTML in password recovery emails in versions before 1.0.20.17.

Credit: vulnreport@tenable.com vulnreport@tenable.com

Affected SoftwareAffected VersionHow to fix
Grandstream UCM6200
Grandstream Ucm6200 Firmware<1.0.19.20
Grandstream UCM6200
All of
Grandstream Ucm6200 Firmware<1.0.19.20
Grandstream UCM6200

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2020-5722?

    CVE-2020-5722 is a SQL Injection vulnerability in the Grandstream Networks UCM6200 Series.

  • How does CVE-2020-5722 affect the Grandstream UCM6200 series?

    CVE-2020-5722 allows an unauthenticated remote attacker to execute shell commands as root or inject HTML in password recovery emails on Grandstream UCM6200 firmware versions before 1.0.19.20.

  • What is the severity of CVE-2020-5722?

    CVE-2020-5722 has a severity rating of 9.8 (Critical) based on CVSS v3.1.

  • How can I fix CVE-2020-5722?

    To fix CVE-2020-5722, update Grandstream UCM6200 firmware to version 1.0.19.20 or later.

  • Where can I find more information about CVE-2020-5722?

    You can find more information about CVE-2020-5722 on the following references: [1] [2] [3]

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203