CVE-2019-10655

Grandstream GAC2500 1.0.3.35, GXP2200 1.0.3.27, GVC3202 1.0.3.51, GXV3275 before 1.0.3.219 Beta, and GXV3240 before 1.0.3.219 Beta devices allow unauthenticated remote code execution via shell metacharacters in a /manager?action=getlogcat priority field, in conjunction with a buffer overflow (via the phonecookie cookie) to overwrite a data structure and consequently bypass authentication. This can be exploited remotely or via CSRF because the cookie can be placed in an Accept HTTP header in an XMLHttpRequest call to lighttpd.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:grandstream:gac2500_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:gac2500:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:grandstream:gvc3202_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:gvc3202:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:grandstream:gxv3275_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:gxv3275:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:grandstream:gxv3240_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:gxv3240:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:grandstream:gxp2200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:gxp2200:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:19

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/165643/Grandstream-GXV3175-Unauthenticated-Command-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/165643/Grandstream-GXV3175-Unauthenticated-Command-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/165931/Grandstream-GXV31XX-settimezone-Unauthenticated-Command-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/165931/Grandstream-GXV31XX-settimezone-Unauthenticated-Command-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () https://github.com/scarvell/grandstream_exploits - Exploit, Third Party Advisory () https://github.com/scarvell/grandstream_exploits - Exploit, Third Party Advisory
References () https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1 - Third Party Advisory () https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1 - Third Party Advisory

Information

Published : 2019-03-30 17:29

Updated : 2024-11-21 04:19


NVD link : CVE-2019-10655

Mitre link : CVE-2019-10655

CVE.ORG link : CVE-2019-10655


JSON object : View

Products Affected

grandstream

  • gac2500
  • gvc3202_firmware
  • gxv3240_firmware
  • gvc3202
  • gac2500_firmware
  • gxv3275
  • gxp2200
  • gxv3275_firmware
  • gxp2200_firmware
  • gxv3240
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-352

Cross-Site Request Forgery (CSRF)