Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Flaw in Grandstream VoIP Phones Enables Remote Hacking

Critical Flaw in Grandstream VoIP Phones Enables Remote Hacking

Posted on February 18, 2026 By CWS

Cybersecurity experts have uncovered a significant vulnerability in the Grandstream GXP1600 VoIP phone series, which can be exploited by attackers to gain control over affected units. This flaw, identified as CVE-2026-2329, has been assigned a critical CVSS score of 9.3, indicating its potential impact. The issue involves an unauthenticated stack-based buffer overflow that could permit remote code execution.

Details of the Security Vulnerability

The vulnerability, discovered by Rapid7 researcher Stephen Fewer, was reported on January 6, 2026. It resides in the web-based API service of the device, specifically the “/cgi-bin/api.values.get” endpoint. This service is used to retrieve configuration details like the firmware version through a colon-separated string in the “request” parameter. The problem arises due to the absence of a length check when appending characters to a 64-byte buffer, which can lead to overflow.

According to Fewer, the endpoint’s design flaw allows attackers to manipulate the “request” parameter, writing beyond the buffer’s capacity. This overflow could overwrite adjacent memory on the stack, facilitating remote code execution. As a result, threat actors could potentially compromise the device’s operating system.

Impact on Grandstream VoIP Models

This vulnerability affects several models, including GXP1610, GXP1615, GXP1620, GXP1625, GXP1628, and GXP1630. Grandstream addressed the issue by releasing a firmware update (version 1.0.7.81) at the end of last month. The update aims to rectify this critical security flaw.

Furthermore, Rapid7 developed a Metasploit exploit module to demonstrate how an attacker could exploit this vulnerability to gain root access. The exploit can be combined with other techniques to extract sensitive data from compromised devices.

Potential Consequences of Exploitation

The remote code execution capability enables attackers to modify the device settings, such as redirecting its connections through a compromised Session Initiation Protocol (SIP) proxy. This manipulation could allow attackers to intercept and eavesdrop on phone conversations conducted over the VoIP network. A SIP proxy acts as a mediator in VoIP systems, facilitating call setup and management.

While the exploit is not straightforward or easy to execute, the underlying vulnerability significantly reduces the security threshold for these devices, especially in environments with minimal protection. Operators of affected devices should be vigilant and apply the necessary updates to safeguard their systems.

In conclusion, the discovery of this vulnerability underlines the importance of maintaining up-to-date security measures for network-connected devices. As attackers continue to find new ways to exploit such flaws, staying informed and proactive in patching vulnerabilities is crucial for protecting sensitive communications and data.

The Hacker News Tags:buffer overflow, CVE-2026-2329, Cybersecurity, enterprise security, exposure risk, firmware update, Grandstream, network security, phone security, Rapid7, remote code execution, security flaw, SIP proxy, VoIP, vulnerability patch

Post navigation

Previous Post: OpenClaw AI Enhances Security and Anthropic Support
Next Post: Malicious Skills Found in OpenClaw’s ClawHub Marketplace

Related Posts

APT28 Exploits Microsoft Office Flaw in Malware Attacks APT28 Exploits Microsoft Office Flaw in Malware Attacks The Hacker News
How to Gain Control of AI Agents and Non-Human Identities How to Gain Control of AI Agents and Non-Human Identities The Hacker News
North Korea-Linked Hackers Steal .02 Billion in 2025, Leading Global Crypto Theft North Korea-Linked Hackers Steal $2.02 Billion in 2025, Leading Global Crypto Theft The Hacker News
Malicious PyPI Package Posing as Solana Tool Stole Source Code in 761 Downloads Malicious PyPI Package Posing as Solana Tool Stole Source Code in 761 Downloads The Hacker News
Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia The Hacker News
F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Crypto Scams Surge in Asia with Sophisticated Tactics
  • MacOS Developers Targeted by Cuckoo Stealer via Fake Homebrew
  • Cellebrite Technology Utilized on Kenyan Activist’s Phone
  • Malicious Skills Found in OpenClaw’s ClawHub Marketplace
  • Critical Flaw in Grandstream VoIP Phones Enables Remote Hacking

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Crypto Scams Surge in Asia with Sophisticated Tactics
  • MacOS Developers Targeted by Cuckoo Stealer via Fake Homebrew
  • Cellebrite Technology Utilized on Kenyan Activist’s Phone
  • Malicious Skills Found in OpenClaw’s ClawHub Marketplace
  • Critical Flaw in Grandstream VoIP Phones Enables Remote Hacking

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News