
A essential vulnerability in Grandstream GXP1600 sequence VoIP telephones permits a distant, unauthenticated attacker to realize root privileges and silently snoop on communications.
VoIP communication gear from Grandstream Networks is being utilized by small and medium companies. The maker’s GXP product line is a part of the corporate’s high-end providing for companies, faculties, accommodations, and Web Telephony Service Suppliers (ITSP) around the globe.
The vulnerability is tracked as CVE-2026-2329 and acquired a essential severity rating of 9.3. It impacts the next six fashions of the GXP1600 sequence of gadgets that run firmware variations previous to 1.0.7.81:
- GXP1610
- GXP1615
- GXP1620
- GXP1625
- GXP1628
- GXP1630
Even when a weak system will not be immediately reachable over the general public web, an attacker can pivot to it from one other host on the community. Exploitation is silent, and the whole lot works as anticipated.
In a technical report, Rapid7 researchers clarify that the issue is within the system’s web-based API service (/cgi-bin/api.values.get), which is accessible with out authentication within the default configuration.
The API accepts a ‘request’ parameter containing colon-delimited identifiers, which is parsed right into a 64-byte stack buffer with out performing a size examine when copying characters into the buffer.
Due to this, an attacker supplying overly lengthy enter could cause a stack overflow, overwriting adjoining reminiscence to realize management over a number of CPU registers, such because the Program Counter.
Rapid7 researchers developed a working Metasploit module to exhibit unauthenticated distant code execution as root by exploiting CVE-2026-2329.

Supply: Rapid7
Exploitation permits arbitrary OS command execution, extracting saved credentials of native customers and SIP accounts, and reconfiguring the system to use a malicious SIP proxy that enables eavesdropping on calls.

Supply: Rapid7
Rapid7 researchers say that profitable exploitation requires writing a number of null bytes to assemble a return-oriented programming (ROP) chain. Nevertheless, CVE-2026-2329 permits writing of just one null terminator byte in the course of the overflow.
To bypass the restriction, the researchers used a number of colon-separated identifiers to set off the overflow repeatedly and write null bytes a number of occasions.
“Each time a colon is encountered, the overflow could be triggered a subsequent time by way of the subsequent identifier,” clarify the researchers within the technical writeup.
“We will leverage this, and the power to jot down a single null byte because the final character within the present identifier being processed, to jot down a number of null bytes throughout exploitation.”
The researchers contacted Grandstream on January 6 and once more on January 20 after receiving no response.
Ultimately, Grandstream mounted the problem on February 3, with the discharge of firmware model 1.0.7.81.
Technical particulars and a module for the Metasploit penetration testing and exploitation framework. Customers of weak Grandstream merchandise are strongly suggested to use out there safety updates as quickly as doable.

