Vulnerability Description
Grandstream GAC2500 1.0.3.35, GXP2200 1.0.3.27, GVC3202 1.0.3.51, GXV3275 before 1.0.3.219 Beta, and GXV3240 before 1.0.3.219 Beta devices allow unauthenticated remote code execution via shell metacharacters in a /manager?action=getlogcat priority field, in conjunction with a buffer overflow (via the phonecookie cookie) to overwrite a data structure and consequently bypass authentication. This can be exploited remotely or via CSRF because the cookie can be placed in an Accept HTTP header in an XMLHttpRequest call to lighttpd.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Grandstream | Gac2500 Firmware | <= 1.0.3.35 |
| Grandstream | Gac2500 | - |
| Grandstream | Gvc3202 Firmware | < 1.0.3.51 |
| Grandstream | Gvc3202 | - |
| Grandstream | Gxv3275 Firmware | < 1.0.3.219 |
| Grandstream | Gxv3275 | - |
| Grandstream | Gxv3240 Firmware | < 1.0.3.219 |
| Grandstream | Gxv3240 | - |
| Grandstream | Gxp2200 Firmware | <= 1.0.3.27 |
| Grandstream | Gxp2200 | - |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/165643/Grandstream-GXV3175-Unauthenticated-ExploitThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/165931/Grandstream-GXV31XX-settimezone-UnauExploitThird Party AdvisoryVDB Entry
- https://github.com/scarvell/grandstream_exploitsExploitThird Party Advisory
- https://www.trustwave.com/en-us/resources/security-resources/security-advisoriesThird Party Advisory
- http://packetstormsecurity.com/files/165643/Grandstream-GXV3175-Unauthenticated-ExploitThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/165931/Grandstream-GXV31XX-settimezone-UnauExploitThird Party AdvisoryVDB Entry
- https://github.com/scarvell/grandstream_exploitsExploitThird Party Advisory
- https://www.trustwave.com/en-us/resources/security-resources/security-advisoriesThird Party Advisory
FAQ
What is CVE-2019-10655?
CVE-2019-10655 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Grandstream GAC2500 1.0.3.35, GXP2200 1.0.3.27, GVC3202 1.0.3.51, GXV3275 before 1.0.3.219 Beta, and GXV3240 before 1.0.3.219 Beta devices allow unauthenticated remote code execution via shell metacha...
How severe is CVE-2019-10655?
CVE-2019-10655 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-10655?
Check the references section above for vendor advisories and patch information. Affected products include: Grandstream Gac2500 Firmware, Grandstream Gac2500, Grandstream Gvc3202 Firmware, Grandstream Gvc3202, Grandstream Gxv3275 Firmware.