CVE-2020-5738
Published Apr 14, 2020
Last updated 5 years ago
Overview
- Description
- Grandstream GXP1600 series firmware 1.0.4.152 and below is vulnerable to authenticated remote command execution when an attacker uploads a specially crafted tar file to the HTTP /cgi-bin/upload_vpntar interface.
- Source
- vulnreport@tenable.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 9
- Impact score
- 10
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:C/I:C/A:C
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:grandstream:gxp1610_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "718E23DE-61E2-47CE-894B-E3B4EFCB761E", "versionEndIncluding": "1.0.4.152" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:grandstream:gxp1610:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D92122D2-AD92-4EC3-81C3-CC58C3E3C287" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:grandstream:gxp1615_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0285B11D-A50B-4650-ADDE-DC1D140AB894", "versionEndIncluding": "1.0.4.152" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:grandstream:gxp1615:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "713E836B-E61E-4E74-9026-F6470C9555F1" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:grandstream:gxp1620_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12FDA102-F6D4-4F67-A07C-9919FA23BB6E", "versionEndIncluding": "1.0.4.152" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:grandstream:gxp1620:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "898FC5BB-6D88-4ED3-95FE-ACFA8D99AAD7" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:grandstream:gxp1625_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "427357FB-9EEE-43D8-B683-9BD412A68FC7", "versionEndIncluding": "1.0.4.152" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:grandstream:gxp1625:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "280FCCEF-196B-4BD4-B5C2-7DECC224A84C" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:grandstream:gxp1628_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2C15DDAE-9E8F-4BCB-8650-E70374A2A33F", "versionEndIncluding": "1.0.4.152" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:grandstream:gxp1628:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8CDF28C0-982E-4DB8-8F3A-75103F2AF9A4" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:grandstream:gxp1630_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D23F0025-3B02-43BD-8778-C91B40424DB1", "versionEndIncluding": "1.0.4.152" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:grandstream:gxp1630:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "63FC9463-51FD-493D-B2FD-4E61EC6B98CA" } ], "operator": "OR" } ], "operator": "AND" } ]