Impact
A stack-based buffer overflow exists in the HTTP API endpoint /cgi-bin/api.values.get on Grandstream VoIP phones. The vulnerability can be triggered without authentication and allows an attacker to execute arbitrary code with root privileges on the device.
Affected Systems
All six GXP series models—GXP1610, GXP1615, GXP1620, GXP1625, GXP1628, and GXP1630—are affected.
Risk and Exploitability
The flaw carries a high severity CVSS score of 9.3 and an EPSS score of 35%, indicating a substantial likelihood of exploitation. While currently not listed in the CISA KEV catalog, the unauthenticated remote attack vector means any device exposed to the network can be targeted. An attacker can send a crafted HTTP request to the vulnerable endpoint, overflow the stack, and gain root-level code execution, fully compromising confidentiality, integrity, and availability of the VoIP phone.
OpenCVE Enrichment