First published: Tue Sep 20 2022(Updated: )
an attacker with knowledge of user/pass of Grandstream GSD3710 in its 1.0.11.13 version, could overflow the stack since it doesn't check the param length before use the strcopy instruction. The explotation of this vulnerability may lead an attacker to execute a shell with full access.
Credit: cve-coordination@incibe.es
Affected Software | Affected Version | How to fix |
---|---|---|
Grandstream Gds3710 Firmware | =1.0.11.13 | |
Grandstream Gds3710 |
This vulnerability has been solved by Grandstream in the 1.0.11.23 version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2025 is a vulnerability that allows an attacker with knowledge of the user/pass of Grandstream GSD3710 version 1.0.11.13 to overflow the stack and execute a shell with full access.
CVE-2022-2025 has a severity rating of 9.8, which is considered critical.
CVE-2022-2025 affects Grandstream GSD3710 version 1.0.11.13, allowing an attacker to overflow the stack and execute a shell with full access.
There is no information available about current exploitation of CVE-2022-2025.
To mitigate CVE-2022-2025, it is recommended to update Grandstream GSD3710 to a version that addresses the vulnerability.