The Grandstream UCM Series IP PBX before firmware version 1.0.20.52 is affected by a parameter injection vulnerability in the HTTP interface. A remote and authenticated attacker can execute arbitrary code by sending a crafted HTTP request. Authentication may be possible using a default user and password. Affected models are the UCM6202, UCM6204, UCM6208, and UCM6510.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-16623 | The Grandstream UCM Series IP PBX before firmware version 1.0.20.52 is affected by a parameter injection vulnerability in the HTTP interface. A remote and authenticated attacker can execute arbitrary code by sending a crafted HTTP request. Authentication may be possible using a default user and password. Affected models are the UCM6202, UCM6204, UCM6208, and UCM6510. |
Fixes
Solution
Upgrade to firmware version 1.0.20.52 or later. Ensure the web interface is not exposed to the internet.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2024-08-01T18:18:18.719Z
Reserved: 2024-01-23T21:10:19.364Z
Link: CVE-2024-0840
Updated: 2024-08-01T18:18:18.719Z
Status : Awaiting Analysis
Published: 2024-04-29T19:15:19.730
Modified: 2024-11-21T08:47:29.257
Link: CVE-2024-0840
No data.
OpenCVE Enrichment
No data.
EUVD