Grandstream GXP1600 series firmware 1.0.4.152 and below is vulnerable to authenticated remote command execution when an attacker adds an OpenVPN up script to the phone's VPN settings via the "Additional Settings" field in the web interface. When the VPN's connection is established, the user defined script is executed with root privileges.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2020-26898 | Grandstream GXP1600 series firmware 1.0.4.152 and below is vulnerable to authenticated remote command execution when an attacker adds an OpenVPN up script to the phone's VPN settings via the "Additional Settings" field in the web interface. When the VPN's connection is established, the user defined script is executed with root privileges. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://www.tenable.com/security/research/tra-2020-22 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2024-08-04T08:39:25.705Z
Reserved: 2020-01-06T00:00:00
Link: CVE-2020-5739

No data.

Status : Modified
Published: 2020-04-14T14:15:12.007
Modified: 2024-11-21T05:34:30.837
Link: CVE-2020-5739

No data.

No data.