Overview
- Description
- The HTTP interface of the Grandstream UCM6200 series is vulnerable to an unauthenticated remote SQL injection via crafted HTTP request. An attacker can use this vulnerability to execute shell commands as root on versions before 1.0.19.20 or inject HTML in password recovery emails in versions before 1.0.20.17.
- Source
- vulnreport@tenable.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Known exploits
Data from CISA
- Vulnerability name
- Grandstream Networks UCM6200 Series SQL Injection Vulnerability
- Exploit added on
- Jan 28, 2022
- Exploit action due
- Jul 28, 2022
- Required action
- Apply updates per vendor instructions.
Weaknesses
- nvd@nist.gov
- CWE-89
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:grandstream:ucm6200_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "98FF035C-153C-497E-B889-6C7D836769EA", "versionEndExcluding": "1.0.19.20" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:grandstream:ucm6200:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F9F3E859-0FC6-44E6-909E-4312CBA03032" } ], "operator": "OR" } ], "operator": "AND" } ]