An unauthenticated stack-based buffer overflow vulnerability exists in the HTTP API endpoint /cgi-bin/api.values.get. A remote attacker can leverage this vulnerability to achieve unauthenticated remote code execution (RCE) with root privileges on a target device. The vulnerability affects all six device models in the series: GXP1610, GXP1615, GXP1620, GXP1625, GXP1628, and GXP1630.
References
| Link | Resource |
|---|---|
| https://firmware.grandstream.com/Release_Note_GXP16xx_1.0.7.81.pdf | Product Release Notes |
| https://github.com/rapid7/metasploit-framework/pull/20983 | VDB Entry Patch |
| https://psirt.grandstream.com/ | Vendor Advisory |
| https://www.rapid7.com/blog/post/ve-cve-2026-2329-critical-unauthenticated-stack-buffer-overflow-in-grandstream-gxp1600-voip-phones-fixed | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
Configuration 6 (hide)
| AND |
|
History
20 Feb 2026, 20:57
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://firmware.grandstream.com/Release_Note_GXP16xx_1.0.7.81.pdf - Product, Release Notes | |
| References | () https://github.com/rapid7/metasploit-framework/pull/20983 - VDB Entry, Patch | |
| References | () https://psirt.grandstream.com/ - Vendor Advisory | |
| References | () https://www.rapid7.com/blog/post/ve-cve-2026-2329-critical-unauthenticated-stack-buffer-overflow-in-grandstream-gxp1600-voip-phones-fixed - Third Party Advisory, VDB Entry | |
| Summary |
|
|
| CPE | cpe:2.3:o:grandstream:gxp1615_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:grandstream:gxp1628_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:grandstream:gxp1620_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:grandstream:gxp1610_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:grandstream:gxp1630_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:grandstream:gxp1625_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:grandstream:gxp1615:-:*:*:*:*:*:*:* cpe:2.3:h:grandstream:gxp1620:-:*:*:*:*:*:*:* cpe:2.3:h:grandstream:gxp1628:-:*:*:*:*:*:*:* cpe:2.3:h:grandstream:gxp1625:-:*:*:*:*:*:*:* cpe:2.3:h:grandstream:gxp1630:-:*:*:*:*:*:*:* cpe:2.3:h:grandstream:gxp1610:-:*:*:*:*:*:*:* |
|
| First Time |
Grandstream gxp1628
Grandstream gxp1620 Grandstream gxp1615 Firmware Grandstream Grandstream gxp1620 Firmware Grandstream gxp1625 Grandstream gxp1615 Grandstream gxp1625 Firmware Grandstream gxp1610 Grandstream gxp1630 Firmware Grandstream gxp1610 Firmware Grandstream gxp1628 Firmware Grandstream gxp1630 |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
18 Feb 2026, 15:18
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-18 15:18
Updated : 2026-02-20 20:57
NVD link : CVE-2026-2329
Mitre link : CVE-2026-2329
CVE.ORG link : CVE-2026-2329
JSON object : View
Products Affected
grandstream
- gxp1625
- gxp1620_firmware
- gxp1610
- gxp1630
- gxp1628_firmware
- gxp1610_firmware
- gxp1630_firmware
- gxp1615_firmware
- gxp1615
- gxp1625_firmware
- gxp1628
- gxp1620
CWE
CWE-121
Stack-based Buffer Overflow
