The Grandstream UCM Series IP PBX before firmware version 1.0.20.52 is affected by a parameter injection vulnerability in the HTTP interface. A remote and authenticated attacker can execute arbitrary code by sending a crafted HTTP request. Authentication may be possible using a default user and password. Affected models are the UCM6202, UCM6204, UCM6208, and UCM6510.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-16623 The Grandstream UCM Series IP PBX before firmware version 1.0.20.52 is affected by a parameter injection vulnerability in the HTTP interface. A remote and authenticated attacker can execute arbitrary code by sending a crafted HTTP request. Authentication may be possible using a default user and password. Affected models are the UCM6202, UCM6204, UCM6208, and UCM6510.
Fixes

Solution

Upgrade to firmware version 1.0.20.52 or later. Ensure the web interface is not exposed to the internet.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2024-08-01T18:18:18.719Z

Reserved: 2024-01-23T21:10:19.364Z

Link: CVE-2024-0840

cve-icon Vulnrichment

Updated: 2024-08-01T18:18:18.719Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-04-29T19:15:19.730

Modified: 2024-11-21T08:47:29.257

Link: CVE-2024-0840

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.