CVE-2026-2329
Severity CVSS v4.0:
CRITICAL
Type:
CWE-121
Stack-based Buffer Overflow
Publication date:
18/02/2026
Last modified:
20/02/2026
Description
An unauthenticated stack-based buffer overflow vulnerability exists in the HTTP API endpoint /cgi-bin/api.values.get. A remote attacker can leverage this vulnerability to achieve unauthenticated remote code execution (RCE) with root privileges on a target device. The vulnerability affects all six device models in the series: GXP1610, GXP1615, GXP1620, GXP1625, GXP1628, and GXP1630.
Impact
Base Score 4.0
9.30
Severity 4.0
CRITICAL
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:grandstream:gxp1610_firmware:*:*:*:*:*:*:*:* | 1.0.7.81 (excluding) | |
| cpe:2.3:h:grandstream:gxp1610:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:grandstream:gxp1615_firmware:*:*:*:*:*:*:*:* | 1.0.7.81 (excluding) | |
| cpe:2.3:h:grandstream:gxp1615:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:grandstream:gxp1620_firmware:*:*:*:*:*:*:*:* | 1.0.7.81 (excluding) | |
| cpe:2.3:h:grandstream:gxp1620:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:grandstream:gxp1625_firmware:*:*:*:*:*:*:*:* | 1.0.7.81 (excluding) | |
| cpe:2.3:h:grandstream:gxp1625:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:grandstream:gxp1628_firmware:*:*:*:*:*:*:*:* | 1.0.7.81 (excluding) | |
| cpe:2.3:h:grandstream:gxp1628:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:grandstream:gxp1630_firmware:*:*:*:*:*:*:*:* | 1.0.7.81 (excluding) | |
| cpe:2.3:h:grandstream:gxp1630:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



