{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T21:28:01.705","vulnerabilities":[{"cve":{"id":"CVE-2020-5739","sourceIdentifier":"vulnreport@tenable.com","published":"2020-04-14T14:15:12.007","lastModified":"2024-11-21T05:34:30.837","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Grandstream GXP1600 series firmware 1.0.4.152 and below is vulnerable to authenticated remote command execution when an attacker adds an OpenVPN up script to the phone's VPN settings via the \"Additional Settings\" field in the web interface. When the VPN's connection is established, the user defined script is executed with root privileges."},{"lang":"es","value":"La serie Grandstream GXP1600 versión de firmware 1.0.4.152 y posteriores, es vulnerable a una ejecución de comandos remota autenticada cuando un atacante agrega un script de OpenVPN a la configuración de VPN del teléfono por medio del campo \"Additional Settings\" en la interfaz web. Cuando la conexión de VPN es establecida, el script definido por el usuario es ejecutado con privilegios root."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C","baseScore":9.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"vulnreport@tenable.com","type":"Secondary","description":[{"lang":"en","value":"CWE-94"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-94"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:grandstream:gxp1610_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.0.4.152","matchCriteriaId":"718E23DE-61E2-47CE-894B-E3B4EFCB761E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:grandstream:gxp1610:-:*:*:*:*:*:*:*","matchCriteriaId":"D92122D2-AD92-4EC3-81C3-CC58C3E3C287"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:grandstream:gxp1615_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.0.4.152","matchCriteriaId":"0285B11D-A50B-4650-ADDE-DC1D140AB894"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:grandstream:gxp1615:-:*:*:*:*:*:*:*","matchCriteriaId":"713E836B-E61E-4E74-9026-F6470C9555F1"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:grandstream:gxp1620_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.0.4.152","matchCriteriaId":"12FDA102-F6D4-4F67-A07C-9919FA23BB6E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:grandstream:gxp1620:-:*:*:*:*:*:*:*","matchCriteriaId":"898FC5BB-6D88-4ED3-95FE-ACFA8D99AAD7"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:grandstream:gxp1625_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.0.4.152","matchCriteriaId":"427357FB-9EEE-43D8-B683-9BD412A68FC7"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:grandstream:gxp1625:-:*:*:*:*:*:*:*","matchCriteriaId":"280FCCEF-196B-4BD4-B5C2-7DECC224A84C"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:grandstream:gxp1628_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.0.4.152","matchCriteriaId":"2C15DDAE-9E8F-4BCB-8650-E70374A2A33F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:grandstream:gxp1628:-:*:*:*:*:*:*:*","matchCriteriaId":"8CDF28C0-982E-4DB8-8F3A-75103F2AF9A4"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:grandstream:gxp1630_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.0.4.152","matchCriteriaId":"D23F0025-3B02-43BD-8778-C91B40424DB1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:grandstream:gxp1630:-:*:*:*:*:*:*:*","matchCriteriaId":"63FC9463-51FD-493D-B2FD-4E61EC6B98CA"}]}]}],"references":[{"url":"https://www.tenable.com/security/research/tra-2020-22","source":"vulnreport@tenable.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://www.tenable.com/security/research/tra-2020-22","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}}]}