Critical Buffer Overflow Exposes Grandstream VoIP Phones to Attackers
Basically, a flaw in VoIP phones lets hackers take control without a password.
A critical vulnerability in Grandstream GXP1600 VoIP phones allows hackers to gain control without authentication. All models in the series are affected, posing serious risks to user privacy and security. A firmware update is now available to fix the issue, so act fast to protect your devices.
What Happened
A serious vulnerability has been uncovered in the Grandstream GXP1600 series of VoIP phones, known as CVE-2026-2329. Discovered by Rapid7 Labs, this critical flaw allows unauthenticated remote code execution (RCE), meaning attackers can control the device without needing any password. The vulnerability is found in the device's web-based API service?, which is accessible in its default settings.
This issue affects all six models in the GXP1600 series: GXP1610, GXP1615, GXP1620, GXP1625, GXP1628, and GXP1630. With a CVSSv4 score of 9.3, this vulnerability is classified as critical, indicating a high risk to users. A firmware update? (version 1.0.7.81) has been released to fix this issue, but users need to act quickly to protect their devices.
Why Should You Care
If you own one of these VoIP phones, your security is at risk. An attacker could gain root access to your device, allowing them to intercept phone calls and access sensitive information, like user credentials. Imagine someone listening in on your private conversations or stealing your passwords — it’s not just a technical problem; it’s a personal one.
The key takeaway here is that if you use these phones, you must update your firmware immediately. Ignoring this vulnerability could lead to serious privacy breaches and potential financial loss.
What's Being Done
Rapid7 has already provided a fix for this vulnerability, but it’s crucial for users to take action. Here’s what you should do:
- Update your Grandstream GXP1600 series phone to firmware version 1.0.7.81.
- Review your device settings to ensure they are secure.
- Monitor for any unusual activity on your VoIP network.
Experts are closely watching how many users will implement the patch and whether attackers will exploit this vulnerability before it’s widely addressed. Stay vigilant and ensure your devices are secure.
Rapid7 Blog