PT-2026-20432 · Grandstream · Gxp1610+5
Sfewer-R7
·
Published
2026-02-18
·
Updated
2026-03-05
·
CVE-2026-2329
CVSS v2.0
10
10
Critical
| Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Grandstream GXP1600 series VoIP phones
Grandstream GXP1610 through GXP1630
Grandstream GXP1600 versions prior to 1.0.7.81
Description
An unauthenticated stack-based buffer overflow vulnerability exists in the HTTP API endpoint
/cgi-bin/api.values.get of Grandstream GXP1600 series VoIP phones. This vulnerability allows a remote attacker to achieve unauthenticated remote code execution (RCE) with root privileges on a target device. Successful exploitation can lead to the theft of SIP and local credentials, device reconfiguration to malicious SIP proxies, transparent call interception, and real-time eavesdropping. The vulnerability allows attackers to silently intercept calls without any visible indicators. The affected devices can be used as stealthy internal network footholds. The vulnerability is tracked as CVE-2026-2329 and has a CVSS score of 9.3.Recommendations
Grandstream GXP1610 versions prior to 1.0.7.81: Update to firmware version 1.0.7.81 or later.
Grandstream GXP1615 versions prior to 1.0.7.81: Update to firmware version 1.0.7.81 or later.
Grandstream GXP1620 versions prior to 1.0.7.81: Update to firmware version 1.0.7.81 or later.
Grandstream GXP1625 versions prior to 1.0.7.81: Update to firmware version 1.0.7.81 or later.
Grandstream GXP1628 versions prior to 1.0.7.81: Update to firmware version 1.0.7.81 or later.
Grandstream GXP1630 versions prior to 1.0.7.81: Update to firmware version 1.0.7.81 or later.
Restrict access to the
/cgi-bin/api.values.get API endpoint.
Segment VoIP gear using VLANs or Access Control Lists (ACLs).
Disable unnecessary services on the devices.
Monitor SIP traffic for anomalies.Exploit
Fix
RCE
Buffer Overflow
Stack Overflow
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
BDU:2026-01979
CVE-2026-2329
Affected Products
Gxp1610
Gxp1615
Gxp1620
Gxp1625
Gxp1628
Gxp1630
References · 86
- 🔥 https://github.com/rapid7/metasploit-framework/pull/20983⭐ 37546 🔗 14745 · Exploit
- https://bdu.fstec.ru/vul/2026-01979 · Security Note
- https://psirt.grandstream.com · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-2329 · Security Note
- https://twitter.com/TheHackersNews/status/2024161033590571468 · Twitter Post
- https://firmware.grandstream.com/Release_Note_GXP16xx_1.0.7.81.pdf · Note
- https://twitter.com/Saints16294225/status/2025912769351131145 · Twitter Post
- https://twitter.com/helpnetsecurity/status/2024462599232836044 · Twitter Post
- https://twitter.com/ThreatSynop/status/2024472905514434733 · Twitter Post
- https://twitter.com/ThreatSynop/status/2024824730755240162 · Twitter Post
- https://twitter.com/ksg93rd/status/2024522163496120449 · Twitter Post
- https://t.me/true_secator/7937 · Telegram Post
- https://twitter.com/shah_sheikh/status/2025179765926494442 · Twitter Post
- https://twitter.com/stephenfewer/status/2024131000603701592 · Twitter Post
- https://twitter.com/Anonymous_Tech7/status/2024514400858607937 · Twitter Post