Cyber Posture

CVE-2026-2329

CriticalPublic PoC

Published: 18 February 2026

Published
18 February 2026
Modified
20 February 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.3261 96.9th percentile
Risk Priority 39 60% EPSS · 20% KEV · 20% CVSS

Description

An unauthenticated stack-based buffer overflow vulnerability exists in the HTTP API endpoint /cgi-bin/api.values.get. A remote attacker can leverage this vulnerability to achieve unauthenticated remote code execution (RCE) with root privileges on a target device. The vulnerability affects all six device…

more

models in the series: GXP1610, GXP1615, GXP1620, GXP1625, GXP1628, and GXP1630.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents stack-based buffer overflows by validating the length and format of inputs to the vulnerable /cgi-bin/api.values.get HTTP API endpoint.

prevent

Mitigates RCE from stack buffer overflows using memory safeguards like stack canaries, non-executable memory, and address space layout randomization.

prevent

Ensures timely firmware patching to remediate the specific buffer overflow vulnerability affecting Grandstream GXP16xx VoIP phones.

Security SummaryAI

CVE-2026-2329 is an unauthenticated stack-based buffer overflow vulnerability (CWE-121) in the HTTP API endpoint /cgi-bin/api.values.get on Grandstream GXP16xx series VoIP phones. It affects all six models in the series: GXP1610, GXP1615, GXP1620, GXP1625, GXP1628, and GXP1630. The vulnerability was published on 2026-02-18 and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

A remote attacker requires no authentication or privileges to exploit this vulnerability over the network with low complexity. Successful exploitation enables unauthenticated remote code execution (RCE) with root privileges on the target device.

Grandstream's firmware release notes for version 1.0.7.81 address the vulnerability, as do advisories on their PSIRT page at psirt.grandstream.com. A Rapid7 blog post details the issue and its fix, while a Metasploit Framework pull request (#20983) proposes an exploit module.

Details

CWE(s)

Affected Products

grandstream
gxp1610 firmware
≤ 1.0.7.81
grandstream
gxp1615 firmware
≤ 1.0.7.81
grandstream
gxp1620 firmware
≤ 1.0.7.81
grandstream
gxp1625 firmware
≤ 1.0.7.81
grandstream
gxp1628 firmware
≤ 1.0.7.81
grandstream
gxp1630 firmware
≤ 1.0.7.81

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Unauthenticated stack-based buffer overflow in public-facing HTTP API endpoint enables remote code execution, directly facilitating T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References