CVE-2026-2329

An unauthenticated stack-based buffer overflow vulnerability exists in the HTTP API endpoint /cgi-bin/api.values.get. A remote attacker can leverage this vulnerability to achieve unauthenticated remote code execution (RCE) with root privileges on a target device. The vulnerability affects all six device models in the series: GXP1610, GXP1615, GXP1620, GXP1625, GXP1628, and GXP1630.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:grandstream:gxp1610_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:gxp1610:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:grandstream:gxp1615_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:gxp1615:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:grandstream:gxp1620_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:gxp1620:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:grandstream:gxp1625_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:gxp1625:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:grandstream:gxp1628_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:gxp1628:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:grandstream:gxp1630_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:gxp1630:-:*:*:*:*:*:*:*

History

20 Feb 2026, 20:57

Type Values Removed Values Added
References () https://firmware.grandstream.com/Release_Note_GXP16xx_1.0.7.81.pdf - () https://firmware.grandstream.com/Release_Note_GXP16xx_1.0.7.81.pdf - Product, Release Notes
References () https://github.com/rapid7/metasploit-framework/pull/20983 - () https://github.com/rapid7/metasploit-framework/pull/20983 - VDB Entry, Patch
References () https://psirt.grandstream.com/ - () https://psirt.grandstream.com/ - Vendor Advisory
References () https://www.rapid7.com/blog/post/ve-cve-2026-2329-critical-unauthenticated-stack-buffer-overflow-in-grandstream-gxp1600-voip-phones-fixed - () https://www.rapid7.com/blog/post/ve-cve-2026-2329-critical-unauthenticated-stack-buffer-overflow-in-grandstream-gxp1600-voip-phones-fixed - Third Party Advisory, VDB Entry
Summary
  • (es) Existe una vulnerabilidad de desbordamiento de búfer basado en pila no autenticada en el endpoint de la API HTTP /cgi-bin/api.values.get. Un atacante remoto puede aprovechar esta vulnerabilidad para lograr ejecución remota de código (RCE) no autenticada con privilegios de root en un dispositivo objetivo. La vulnerabilidad afecta a los seis modelos de dispositivo de la serie: GXP1610, GXP1615, GXP1620, GXP1625, GXP1628 y GXP1630.
CPE cpe:2.3:o:grandstream:gxp1615_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:grandstream:gxp1628_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:grandstream:gxp1620_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:grandstream:gxp1610_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:grandstream:gxp1630_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:grandstream:gxp1625_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:gxp1615:-:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:gxp1620:-:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:gxp1628:-:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:gxp1625:-:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:gxp1630:-:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:gxp1610:-:*:*:*:*:*:*:*
First Time Grandstream gxp1628
Grandstream gxp1620
Grandstream gxp1615 Firmware
Grandstream
Grandstream gxp1620 Firmware
Grandstream gxp1625
Grandstream gxp1615
Grandstream gxp1625 Firmware
Grandstream gxp1610
Grandstream gxp1630 Firmware
Grandstream gxp1610 Firmware
Grandstream gxp1628 Firmware
Grandstream gxp1630
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

18 Feb 2026, 15:18

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-18 15:18

Updated : 2026-02-20 20:57


NVD link : CVE-2026-2329

Mitre link : CVE-2026-2329

CVE.ORG link : CVE-2026-2329


JSON object : View

Products Affected

grandstream

  • gxp1625
  • gxp1620_firmware
  • gxp1610
  • gxp1630
  • gxp1628_firmware
  • gxp1610_firmware
  • gxp1630_firmware
  • gxp1615_firmware
  • gxp1615
  • gxp1625_firmware
  • gxp1628
  • gxp1620
CWE
CWE-121

Stack-based Buffer Overflow