First published: Fri Jul 17 2020(Updated: )
Grandstream UCM6200 series firmware version 1.0.20.23 and below is vulnerable to OS command injection via HTTP. An authenticated remote attacker can execute commands as the root user by sending a crafted HTTP GET to the UCM's "Old" HTTPS API.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Grandstream Ucm6202 Firmware | <=1.0.20.23 | |
Grandstream Ucm6202 | ||
Grandstream Ucm6204 Firmware | <=1.0.20.23 | |
Grandstream UCM6204 | ||
Grandstream Ucm6208 Firmware | <=1.0.20.23 | |
Grandstream Ucm6208 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-5758 is critical with a CVSS score of 8.8.
CVE-2020-5758 allows an authenticated remote attacker to execute OS commands as the root user by sending a crafted HTTP GET to the UCM's "Old" HTTPS API.
Grandstream UCM6200 series firmware version 1.0.20.23 and below are affected by CVE-2020-5758.
An attacker can exploit CVE-2020-5758 by sending a specially crafted HTTP GET request to the UCM's "Old" HTTPS API.
Yes, Grandstream UCM6202 firmware version 1.0.20.23 is vulnerable to CVE-2020-5758.