First published: Mon Mar 23 2020(Updated: )
The HTTP interface of the Grandstream UCM6200 series is vulnerable to an unauthenticated remote SQL injection via crafted HTTP request. An attacker can use this vulnerability to execute shell commands as root on versions before 1.0.19.20 or inject HTML in password recovery emails in versions before 1.0.20.17.
Credit: vulnreport@tenable.com vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Grandstream UCM6200 | ||
Grandstream Ucm6200 Firmware | <1.0.19.20 | |
Grandstream UCM6200 | ||
All of | ||
Grandstream Ucm6200 Firmware | <1.0.19.20 | |
Grandstream UCM6200 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5722 is a SQL Injection vulnerability in the Grandstream Networks UCM6200 Series.
CVE-2020-5722 allows an unauthenticated remote attacker to execute shell commands as root or inject HTML in password recovery emails on Grandstream UCM6200 firmware versions before 1.0.19.20.
CVE-2020-5722 has a severity rating of 9.8 (Critical) based on CVSS v3.1.
To fix CVE-2020-5722, update Grandstream UCM6200 firmware to version 1.0.19.20 or later.
You can find more information about CVE-2020-5722 on the following references: [1] [2] [3]