🔐 CVE Alert

CVE-2026-2329

UNKNOWN 0.0

Grandstream GXP1600 VoIP Phones - Unauthenticated stack buffer overflow

CVSS Score
0.0
EPSS Score
41.1%
EPSS Percentile
97th

An unauthenticated stack-based buffer overflow vulnerability exists in the HTTP API endpoint /cgi-bin/api.values.get. A remote attacker can leverage this vulnerability to achieve unauthenticated remote code execution (RCE) with root privileges on a target device. The vulnerability affects all six device models in the series: GXP1610, GXP1615, GXP1620, GXP1625, GXP1628, and GXP1630.

CWE CWE-121
Vendor grandstream
Product gxp1610
Published Feb 18, 2026
Last Updated Feb 18, 2026
Stay Ahead of the Next One

Get instant alerts for grandstream gxp1610

Be the first to know when new unknown vulnerabilities affecting grandstream gxp1610 are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Grandstream / GXP1610
0 ≤ 1.0.7.80
Grandstream / GXP1615
0 ≤ 1.0.7.80
Grandstream / GXP1620
0 ≤ 1.0.7.80
Grandstream / GXP1625
0 ≤ 1.0.7.80
Grandstream / GXP1628
0 ≤ 1.0.7.80
Grandstream / GXP1630
0 ≤ 1.0.7.80

References

NVD ↗ CVE.org ↗ EPSS Data ↗
rapid7.com: https://www.rapid7.com/blog/post/ve-cve-2026-2329-critical-unauthenticated-stack-buffer-overflow-in-grandstream-gxp1600-voip-phones-fixed psirt.grandstream.com: https://psirt.grandstream.com/ firmware.grandstream.com: https://firmware.grandstream.com/Release_Note_GXP16xx_1.0.7.81.pdf github.com: https://github.com/rapid7/metasploit-framework/pull/20983

Credits

Stephen Fewer, Senior Principal Security Researcher at Rapid7