An unauthenticated stack-based buffer overflow vulnerability exists in the HTTP API endpoint /cgi-bin/api.values.get. A remote attacker can leverage this vulnerability to achieve unauthenticated remote code execution (RCE) with root privileges on a target device. The vulnerability affects all six device models in the series: GXP1610, GXP1615, GXP1620, GXP1625, GXP1628, and GXP1630.
References
| Link | Resource |
|---|---|
| https://firmware.grandstream.com/Release_Note_GXP16xx_1.0.7.81.pdf | Product Release Notes |
| https://github.com/rapid7/metasploit-framework/pull/20983 | VDB Entry Patch |
| https://psirt.grandstream.com/ | Vendor Advisory |
| https://www.rapid7.com/blog/post/ve-cve-2026-2329-critical-unauthenticated-stack-buffer-overflow-in-grandstream-gxp1600-voip-phones-fixed | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
Configuration 6 (hide)
| AND |
|
History
No history.
Information
Published : 2026-02-18 15:18
Updated : 2026-02-20 20:57
NVD link : CVE-2026-2329
Mitre link : CVE-2026-2329
CVE.ORG link : CVE-2026-2329
JSON object : View
Products Affected
grandstream
- gxp1628_firmware
- gxp1615
- gxp1625_firmware
- gxp1610
- gxp1615_firmware
- gxp1625
- gxp1610_firmware
- gxp1620
- gxp1628
- gxp1620_firmware
- gxp1630
- gxp1630_firmware
CWE
CWE-121
Stack-based Buffer Overflow
