
CVE-2020-5762
https://notcve.org/view.php?id=CVE-2020-5762
29 Jul 2020 — Grandstream HT800 series firmware version 1.0.17.5 and below is vulnerable to a denial of service attack against the TR-069 service. An unauthenticated remote attacker can stop the service due to a NULL pointer dereference in the TR-069 service. This condition is triggered due to mishandling of the HTTP Authentication field. Grandstream serie HT800 versiones de firmware 1.0.17.5 y posteriores, es vulnerable a un ataque de denegación de servicio contra el servicio TR-069. Un atacante remoto no autenticado pu... • https://www.tenable.com/security/research/tra-2020-43 • CWE-476: NULL Pointer Dereference •

CVE-2020-5761
https://notcve.org/view.php?id=CVE-2020-5761
29 Jul 2020 — Grandstream HT800 series firmware version 1.0.17.5 and below is vulnerable to CPU exhaustion due to an infinite loop in the TR-069 service. Unauthenticated remote attackers can trigger this case by sending a one character TCP message to the TR-069 service. Grandstream serie HT800 versiones de firmware 1.0.17.5 y posteriores, es vulnerable a un agotamiento del CPU debido a un bucle infinito en el servicio TR-069. Los atacantes remotos no autenticados pueden activar este caso mediante el envío de un mensaje T... • https://www.tenable.com/security/research/tra-2020-43 • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVE-2020-5760
https://notcve.org/view.php?id=CVE-2020-5760
29 Jul 2020 — Grandstream HT800 series firmware version 1.0.17.5 and below is vulnerable to an OS command injection vulnerability. Unauthenticated remote attackers can execute arbitrary commands as root by crafting a special configuration file and sending a crafted SIP message. Grandstream serie HT800 versiones de firmware 1.0.17.5 y posteriores, es susceptible a una vulnerabilidad de inyección de comandos del Sistema Operativo. Los atacantes remotos no autenticados pueden ejecutar comandos arbitrarios como root mediante... • https://www.tenable.com/security/research/tra-2020-43 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2020-5759
https://notcve.org/view.php?id=CVE-2020-5759
17 Jul 2020 — Grandstream UCM6200 series firmware version 1.0.20.23 and below is vulnerable to OS command injection via SSH. An authenticated remote attacker can execute commands as the root user by issuing a specially crafted "unset" command. Grandstream serie UCM6200 versiones de firmware 1.0.20.23 y posterior, es vulnerable a una inyección de comandos del Sistema Operativo por medio de SSH. Un atacante autenticado remoto puede ejecutar comandos como usuario root al emitir un comando "unset" especialmente diseñado • https://www.tenable.com/cve/CVE-2020-5759 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2020-5758
https://notcve.org/view.php?id=CVE-2020-5758
17 Jul 2020 — Grandstream UCM6200 series firmware version 1.0.20.23 and below is vulnerable to OS command injection via HTTP. An authenticated remote attacker can execute commands as the root user by sending a crafted HTTP GET to the UCM's "Old" HTTPS API. Grandstream serie UCM6200 versiones de firmware 1.0.20.23 y posterior, es vulnerable a una inyección de comandos del Sistema Operativo por medio de HTTP. Un atacante autenticado remoto puede ejecutar comandos como usuario root mediante el envío de un HTTP GET diseñado ... • https://www.tenable.com/cve/CVE-2020-5758 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2020-5757
https://notcve.org/view.php?id=CVE-2020-5757
17 Jul 2020 — Grandstream UCM6200 series firmware version 1.0.20.23 and below is vulnerable to OS command injection via HTTP. An authenticated remote attacker can bypass command injection mitigations and execute commands as the root user by sending a crafted HTTP POST to the UCM's "New" HTTPS API. Grandstream serie UCM6200 versiones de firmware 1.0.20.23 y posterior, es vulnerable a una inyección de comandos del Sistema Operativo por medio de HTTP. Un atacante autenticado remoto puede omitir las mitigaciones de inyección... • https://www.tenable.com/cve/CVE-2020-5757 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2020-5756
https://notcve.org/view.php?id=CVE-2020-5756
17 Jul 2020 — Grandstream GWN7000 firmware version 1.0.9.4 and below allows authenticated remote users to modify the system's crontab via undocumented API. An attacker can use this functionality to execute arbitrary OS commands on the router. Grandstream GWN7000 versiones de firmware 1.0.9.4 y posterior, permite a usuarios autenticados remotos modificar el crontab del sistema por medio de una API no documentada. Un atacante puede usar esta funcionalidad para ejecutar comandos arbitrarios del Sistema Operativo en el enrut... • https://www.tenable.com/cve/CVE-2020-5756 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE-489: Active Debug Code •

CVE-2020-5739
https://notcve.org/view.php?id=CVE-2020-5739
14 Apr 2020 — Grandstream GXP1600 series firmware 1.0.4.152 and below is vulnerable to authenticated remote command execution when an attacker adds an OpenVPN up script to the phone's VPN settings via the "Additional Settings" field in the web interface. When the VPN's connection is established, the user defined script is executed with root privileges. La serie Grandstream GXP1600 versión de firmware 1.0.4.152 y posteriores, es vulnerable a una ejecución de comandos remota autenticada cuando un atacante agrega un script ... • https://www.tenable.com/security/research/tra-2020-22 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2020-5738
https://notcve.org/view.php?id=CVE-2020-5738
14 Apr 2020 — Grandstream GXP1600 series firmware 1.0.4.152 and below is vulnerable to authenticated remote command execution when an attacker uploads a specially crafted tar file to the HTTP /cgi-bin/upload_vpntar interface. La serie Grandstream GXP1600 versión de firmware 1.0.4.152 y posteriores, es vulnerable a una ejecución de comandos remota autenticada cuando un atacante carga un archivo tar especialmente diseñado en la interfaz HTTP /cgi-bin/upload_vpntar. • https://www.tenable.com/security/research/tra-2020-22 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2020-5726 – Grandstream UCM6200 Series CTI Interface - 'user_password' SQL Injection
https://notcve.org/view.php?id=CVE-2020-5726
30 Mar 2020 — The Grandstream UCM6200 series before 1.0.20.22 is vulnerable to an SQL injection via the CTI server on port 8888. A remote unauthenticated attacker can invoke the challenge action with a crafted username and discover user passwords. La serie Grandstream UCM6200 versiones anteriores a 1.0.20.22, es vulnerable a una inyección SQL por medio del servidor CTI en el puerto 8888. Un atacante no autenticado remoto puede invocar la acción challenge con un nombre de usuario diseñado y detectar las contraseñas de usu... • https://packetstorm.news/files/id/156977 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •