CVE-2026-2329

🚨 CRITICAL

An unauthenticated stack-based buffer overflow vulnerability exists in the HTTP API endpoint /cgi-bin/api.values.get. A remote attacker can leverage this vulnerability to achieve unauthenticated remot...

Published
Feb 18, 2026
Last Modified
Feb 20, 2026
Views
4
Bookmarks
0

An unauthenticated stack-based buffer overflow vulnerability exists in the HTTP API endpoint /cgi-bin/api.values.get. A remote attacker can leverage this vulnerability to achieve unauthenticated remote code execution (RCE) with root privileges on a target device. The vulnerability affects all six device models in the series: GXP1610, GXP1615, GXP1620, GXP1625, GXP1628, and GXP1630.

Affected Products (6)

grandstream - gxp1610_firmware

Version: *

grandstream - gxp1615_firmware

Version: *

grandstream - gxp1620_firmware

Version: *

grandstream - gxp1625_firmware

Version: *

grandstream - gxp1628_firmware

Version: *

grandstream - gxp1630_firmware

Version: *

CVSS Scores

CVSS 3.1 9.8
9.8
CRITICAL
CVSS 2.0 9.8

Additional Information

Source
cve@rapid7.com
State
Analyzed

Share CVE-2026-2329

Share on Social Media

Copy Link

Embed Code

Request Expert Analysis

Request a professional security analysis for CVE-2026-2329 from our verified experts.

Credits System

Use your credits to get expert analysis from verified security professionals. Purchase more credits anytime!

Add 3 credits for accelerated delivery

Base Cost: 8 credits
Priority Upgrade: + credits
SLA Acceleration: +3 credits
Total Cost:
Your Balance:

Insufficient Credits

You need more credits to submit this request.

Buy Credits

Report Analysis