CVE-2024-0840
- EPSS 0.37%
- Veröffentlicht 29.04.2024 19:15:19
- Zuletzt bearbeitet 21.11.2024 08:47:29
The Grandstream UCM Series IP PBX before firmware version 1.0.20.52 is affected by a parameter injection vulnerability in the HTTP interface. A remote and authenticated attacker can execute arbitrary code by sending a crafted HTTP request. Authentica...
- EPSS 18.52%
- Veröffentlicht 17.07.2020 21:15:13
- Zuletzt bearbeitet 21.11.2024 05:34:32
Grandstream UCM6200 series firmware version 1.0.20.23 and below is vulnerable to OS command injection via HTTP. An authenticated remote attacker can bypass command injection mitigations and execute commands as the root user by sending a crafted HTTP ...
- EPSS 5.19%
- Veröffentlicht 17.07.2020 21:15:13
- Zuletzt bearbeitet 21.11.2024 05:34:33
Grandstream UCM6200 series firmware version 1.0.20.23 and below is vulnerable to OS command injection via HTTP. An authenticated remote attacker can execute commands as the root user by sending a crafted HTTP GET to the UCM's "Old" HTTPS API.
- EPSS 8.11%
- Veröffentlicht 17.07.2020 21:15:13
- Zuletzt bearbeitet 21.11.2024 05:34:33
Grandstream UCM6200 series firmware version 1.0.20.23 and below is vulnerable to OS command injection via SSH. An authenticated remote attacker can execute commands as the root user by issuing a specially crafted "unset" command.
CVE-2020-5724
- EPSS 60.03%
- Veröffentlicht 30.03.2020 20:15:20
- Zuletzt bearbeitet 21.11.2024 05:34:29
The Grandstream UCM6200 series before 1.0.20.22 is vulnerable to an SQL injection via the HTTP server's websockify endpoint. A remote unauthenticated attacker can invoke the challenge action with a crafted username and discover user passwords.
CVE-2020-5725
- EPSS 0.39%
- Veröffentlicht 30.03.2020 20:15:20
- Zuletzt bearbeitet 21.11.2024 05:34:29
The Grandstream UCM6200 series before 1.0.20.22 is vulnerable to an SQL injection via the HTTP server's websockify endpoint. A remote unauthenticated attacker can invoke the login action with a crafted username and, through the use of timing attacks,...
CVE-2020-5726
- EPSS 6.36%
- Veröffentlicht 30.03.2020 20:15:20
- Zuletzt bearbeitet 21.11.2024 05:34:29
The Grandstream UCM6200 series before 1.0.20.22 is vulnerable to an SQL injection via the CTI server on port 8888. A remote unauthenticated attacker can invoke the challenge action with a crafted username and discover user passwords.
CVE-2020-5723
- EPSS 51.79%
- Veröffentlicht 30.03.2020 20:15:19
- Zuletzt bearbeitet 21.11.2024 05:34:29
The UCM6200 series 1.0.20.22 and below stores unencrypted user passwords in an SQLite database. This could allow an attacker to retrieve all passwords and possibly gain elevated privileges.
- EPSS 9.02%
- Veröffentlicht 30.03.2019 17:29:00
- Zuletzt bearbeitet 21.11.2024 04:19:42
Grandstream UCM6204 before 1.0.19.20 devices allow remote authenticated users to execute arbitrary code via shell metacharacters in the backupUCMConfig file-backup parameter to the /cgi? URI.
CVE-2019-10663
- EPSS 3.57%
- Veröffentlicht 30.03.2019 17:29:00
- Zuletzt bearbeitet 21.11.2024 04:19:42
Grandstream UCM6204 before 1.0.19.20 devices allow remote authenticated users to conduct SQL injection attacks via the sord parameter in a listCodeblueGroup API call to the /cgi? URI.