Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Flaw in Grandstream VoIP phones allows stealthy eavesdropping
    Cybersecurity

    Flaw in Grandstream VoIP phones allows stealthy eavesdropping

    adminBy adminFebruary 19, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Grandstream
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Grandstream

    A critical vulnerability in Grandstream GXP1600 series VoIP phones allows a remote, unauthenticated attacker to gain root privileges and silently eavesdrop on communications.

    VoIP communication equipment from Grandstream Networks is being used by small and medium businesses. The maker’s GXP product line is part of the company’s high-end offering for businesses, schools, hotels, and Internet Telephony Service Providers (ITSP) around the world.

    The vulnerability is tracked as CVE-2026-2329 and received a critical severity score of 9.3. It impacts the following six models of the GXP1600 series of devices that run firmware versions prior to 1.0.7.81:

    Wiz
    • GXP1610
    • GXP1615
    • GXP1620
    • GXP1625
    • GXP1628
    • GXP1630

    Even if a vulnerable device is not directly reachable over the public internet, an attacker can pivot to it from another host on the network. Exploitation is silent, and everything works as expected.

    In a technical report, Rapid7 researchers explain that the problem is in the device’s web-based API service (/cgi-bin/api.values.get), which is accessible without authentication in the default configuration.

    The API accepts a ‘request’ parameter containing colon-delimited identifiers, which is parsed into a 64-byte stack buffer without performing a length check when copying characters into the buffer.

    Because of this, an attacker supplying overly long input can cause a stack overflow, overwriting adjacent memory to gain control over multiple CPU registers, such as the Program Counter.

    Rapid7 researchers developed a working Metasploit module to demonstrate unauthenticated remote code execution as root by exploiting CVE-2026-2329.

    Metasploit module
    Metasploit module
    Source: Rapid7

    Exploitation enables arbitrary OS command execution, extracting stored credentials of local users and SIP accounts, and reconfiguring the device to use a malicious SIP proxy that allows eavesdropping on calls.

    Stealing credentials
    Stealing credentials
    Source: Rapid7

    Rapid7 researchers say that successful exploitation requires writing multiple null bytes to construct a return-oriented programming (ROP) chain. However, CVE-2026-2329 permits writing of only one null terminator byte during the overflow.

    To bypass the restriction, the researchers used multiple colon-separated identifiers to trigger the overflow repeatedly and write null bytes multiple times.

    “Every time a colon is encountered, the overflow can be triggered a subsequent time via the next identifier,” explain the researchers in the technical writeup.

    “We can leverage this, and the ability to write a single null byte as the last character in the current identifier being processed, to write multiple null bytes during exploitation.”

    The researchers contacted Grandstream on January 6 and again on January 20 after receiving no response.

    Eventually, Grandstream fixed the issue on February 3, with the release of firmware version 1.0.7.81.

    Technical details and a module for the Metasploit penetration testing and exploitation framework. Users of vulnerable Grandstream products are strongly advised to apply available security updates as soon as possible.


    tines

    Modern IT infrastructure moves faster than manual workflows can handle.

    In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.

    eavesdropping Flaw Grandstream phones stealthy VoIP
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleWhy AI Misreads The Middle Of Your Best Pages
    Next Article Western Digital wants to ramp-up hard disk drive speeds
    admin
    • Website

    Related Posts

    Russian Ransomware Operator Pleads Guilty in US

    March 5, 2026

    Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical

    March 5, 2026

    Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities

    March 5, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    How to Be the Trusted & Featured Brand

    March 6, 2026

    This 49-inch gaming monitor will get the job done without hurting your wallet too much

    March 6, 2026

    Russian Ransomware Operator Pleads Guilty in US

    March 5, 2026

    Pixel Weather app update brings new redesigned icons

    March 5, 2026
    Categories
    • Blogging (33)
    • Cybersecurity (623)
    • Privacy & Online Earning (92)
    • SEO & Digital Marketing (396)
    • Tech Tools & Mobile / Apps (761)
    • WiFi / Internet & Networking (112)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    How to Be the Trusted & Featured Brand

    March 6, 2026

    This 49-inch gaming monitor will get the job done without hurting your wallet too much

    March 6, 2026

    Russian Ransomware Operator Pleads Guilty in US

    March 5, 2026
    Most Popular
    • How to Be the Trusted & Featured Brand
    • This 49-inch gaming monitor will get the job done without hurting your wallet too much
    • Russian Ransomware Operator Pleads Guilty in US
    • Pixel Weather app update brings new redesigned icons
    • Data center new builds diminish even as demand rises
    • Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical
    • What SMEC’s Data Reveals About AI Max Performance
    • This Ultra phone first to use Sony’s new 200MP camera sensor
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.