CVE-2020-5739

Grandstream GXP1600 series firmware 1.0.4.152 and below is vulnerable to authenticated remote command execution when an attacker adds an OpenVPN up script to the phone's VPN settings via the "Additional Settings" field in the web interface. When the VPN's connection is established, the user defined script is executed with root privileges.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:grandstream:gxp1610_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:gxp1610:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:grandstream:gxp1615_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:gxp1615:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:grandstream:gxp1620_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:gxp1620:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:grandstream:gxp1625_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:gxp1625:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:grandstream:gxp1628_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:gxp1628:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:grandstream:gxp1630_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:gxp1630:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:34

Type Values Removed Values Added
References () https://www.tenable.com/security/research/tra-2020-22 - Exploit, Vendor Advisory () https://www.tenable.com/security/research/tra-2020-22 - Exploit, Vendor Advisory

Information

Published : 2020-04-14 14:15

Updated : 2024-11-21 05:34


NVD link : CVE-2020-5739

Mitre link : CVE-2020-5739

CVE.ORG link : CVE-2020-5739


JSON object : View

Products Affected

grandstream

  • gxp1625_firmware
  • gxp1615
  • gxp1630
  • gxp1625
  • gxp1620
  • gxp1628_firmware
  • gxp1630_firmware
  • gxp1620_firmware
  • gxp1610
  • gxp1628
  • gxp1610_firmware
  • gxp1615_firmware
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')