First published: Thu Oct 28 2021(Updated: )
Multiple buffer overflows in the limited configuration shell (/sbin/gs_config) on Grandstream HT801 devices before 1.0.29 allow remote authenticated users to execute arbitrary code as root via a crafted manage_if setting, thus bypassing the intended restrictions of this shell and taking full control of the device. There are default weak credentials that can be used to authenticate.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Grandstream Ht801 Firmware | <1.0.29 | |
Grandstream HT801 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-37748 is a vulnerability that allows remote authenticated users to execute arbitrary code as root on Grandstream HT801 devices before 1.0.29, bypassing the intended restrictions of the limited configuration shell (/sbin/gs_config).
CVE-2021-37748 has a severity rating of 8.8, which is considered critical.
Grandstream HT801 devices before version 1.0.29 are affected by CVE-2021-37748.
Remote authenticated users can exploit CVE-2021-37748 by crafting a manage_if setting to execute arbitrary code as root on Grandstream HT801 devices.
No, only Grandstream HT801 devices before version 1.0.29 are vulnerable to CVE-2021-37748.