{"id":"CVE-2026-2329","details":"An unauthenticated stack-based buffer overflow vulnerability exists in the HTTP API endpoint /cgi-bin/api.values.get. A remote attacker can leverage this vulnerability to achieve unauthenticated remote code execution (RCE) with root privileges on a target device. The vulnerability affects all six device models in the series: GXP1610, GXP1615, GXP1620, GXP1625, GXP1628, and GXP1630.","modified":"2026-03-13T22:13:40.258251Z","published":"2026-02-18T15:18:44.173Z","references":[{"type":"ADVISORY","url":"https://firmware.grandstream.com/Release_Note_GXP16xx_1.0.7.81.pdf"},{"type":"ADVISORY","url":"https://psirt.grandstream.com/"},{"type":"ADVISORY","url":"https://www.rapid7.com/blog/post/ve-cve-2026-2329-critical-unauthenticated-stack-buffer-overflow-in-grandstream-gxp1600-voip-phones-fixed"},{"type":"FIX","url":"https://github.com/rapid7/metasploit-framework/pull/20983"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-2329.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"1.0.7.81"}]},{"events":[{"introduced":"0"},{"fixed":"1.0.7.81"}]},{"events":[{"introduced":"0"},{"fixed":"1.0.7.81"}]},{"events":[{"introduced":"0"},{"fixed":"1.0.7.81"}]},{"events":[{"introduced":"0"},{"fixed":"1.0.7.81"}]},{"events":[{"introduced":"0"},{"fixed":"1.0.7.81"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}