CVE-2026-2329
Grandstream GXP1600 VoIP Phones - Unauthenticated stack buffer overflow
CVSS Score
0.0
EPSS Score
41.1%
EPSS Percentile
97th
An unauthenticated stack-based buffer overflow vulnerability exists in the HTTP API endpoint /cgi-bin/api.values.get. A remote attacker can leverage this vulnerability to achieve unauthenticated remote code execution (RCE) with root privileges on a target device. The vulnerability affects all six device models in the series: GXP1610, GXP1615, GXP1620, GXP1625, GXP1628, and GXP1630.
| CWE | CWE-121 |
| Vendor | grandstream |
| Product | gxp1610 |
| Published | Feb 18, 2026 |
| Last Updated | Feb 18, 2026 |
Affected Versions
Grandstream / GXP1610
0 ≤ 1.0.7.80
Grandstream / GXP1615
0 ≤ 1.0.7.80
Grandstream / GXP1620
0 ≤ 1.0.7.80
Grandstream / GXP1625
0 ≤ 1.0.7.80
Grandstream / GXP1628
0 ≤ 1.0.7.80
Grandstream / GXP1630
0 ≤ 1.0.7.80
References
rapid7.com: https://www.rapid7.com/blog/post/ve-cve-2026-2329-critical-unauthenticated-stack-buffer-overflow-in-grandstream-gxp1600-voip-phones-fixed psirt.grandstream.com: https://psirt.grandstream.com/ firmware.grandstream.com: https://firmware.grandstream.com/Release_Note_GXP16xx_1.0.7.81.pdf github.com: https://github.com/rapid7/metasploit-framework/pull/20983
Credits
Stephen Fewer, Senior Principal Security Researcher at Rapid7