Thursday, February 19, 2026
HomeTechnologyFlaw in Grandstream VoIP telephones permits stealthy eavesdropping

Flaw in Grandstream VoIP telephones permits stealthy eavesdropping

Flaw in Grandstream VoIP telephones permits stealthy eavesdropping

A important vulnerability in Grandstream GXP1600 sequence VoIP telephones permits a distant, unauthenticated attacker to realize root privileges and silently listen in on communications.

VoIP communication tools from Grandstream Networks is being utilized by small and medium companies. The maker’s GXP product line is a part of the corporate’s high-end providing for companies, colleges, motels, and Web Telephony Service Suppliers (ITSP) all over the world.

The vulnerability is tracked as CVE-2026-2329 and obtained a important severity rating of 9.3. It impacts the next six fashions of the GXP1600 sequence of gadgets that run firmware variations previous to 1.0.7.81:

Wiz
  • GXP1610
  • GXP1615
  • GXP1620
  • GXP1625
  • GXP1628
  • GXP1630

Even when a weak gadget isn’t immediately reachable over the general public web, an attacker can pivot to it from one other host on the community. Exploitation is silent, and every thing works as anticipated.

In a technical report, Rapid7 researchers clarify that the issue is within the gadget’s web-based API service (/cgi-bin/api.values.get), which is accessible with out authentication within the default configuration.

The API accepts a ‘request’ parameter containing colon-delimited identifiers, which is parsed right into a 64-byte stack buffer with out performing a size test when copying characters into the buffer.

Due to this, an attacker supplying overly lengthy enter may cause a stack overflow, overwriting adjoining reminiscence to realize management over a number of CPU registers, such because the Program Counter.

Rapid7 researchers developed a working Metasploit module to exhibit unauthenticated distant code execution as root by exploiting CVE-2026-2329.

Metasploit module
Metasploit module
Supply: Rapid7

Exploitation allows arbitrary OS command execution, extracting saved credentials of native customers and SIP accounts, and reconfiguring the gadget to use a malicious SIP proxy that permits eavesdropping on calls.

Stealing credentials
Stealing credentials
Supply: Rapid7

Rapid7 researchers say that profitable exploitation requires writing a number of null bytes to assemble a return-oriented programming (ROP) chain. Nevertheless, CVE-2026-2329 permits writing of just one null terminator byte in the course of the overflow.

To bypass the restriction, the researchers used a number of colon-separated identifiers to set off the overflow repeatedly and write null bytes a number of occasions.

“Each time a colon is encountered, the overflow may be triggered a subsequent time through the subsequent identifier,” clarify the researchers within the technical writeup.

“We are able to leverage this, and the power to put in writing a single null byte because the final character within the present identifier being processed, to put in writing a number of null bytes throughout exploitation.”

The researchers contacted Grandstream on January 6 and once more on January 20 after receiving no response.

Ultimately, Grandstream mounted the difficulty on February 3, with the discharge of firmware model 1.0.7.81.

Technical particulars and a module for the Metasploit penetration testing and exploitation framework. Customers of weak Grandstream merchandise are strongly suggested to use obtainable safety updates as quickly as potential.

Fashionable IT infrastructure strikes sooner than guide workflows can deal with.

On this new Tines information, learn the way your group can cut back hidden guide delays, enhance reliability by automated response, and construct and scale clever workflows on prime of instruments you already use.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments