Логотип exploitDog
bind:CVE-2020-5739
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-5739

Количество 2

Количество 2

nvd логотип

CVE-2020-5739

почти 6 лет назад

Grandstream GXP1600 series firmware 1.0.4.152 and below is vulnerable to authenticated remote command execution when an attacker adds an OpenVPN up script to the phone's VPN settings via the "Additional Settings" field in the web interface. When the VPN's connection is established, the user defined script is executed with root privileges.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-6p3v-7x9x-66jr

больше 3 лет назад

Grandstream GXP1600 series firmware 1.0.4.152 and below is vulnerable to authenticated remote command execution when an attacker adds an OpenVPN up script to the phone's VPN settings via the "Additional Settings" field in the web interface. When the VPN's connection is established, the user defined script is executed with root privileges.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-5739

Grandstream GXP1600 series firmware 1.0.4.152 and below is vulnerable to authenticated remote command execution when an attacker adds an OpenVPN up script to the phone's VPN settings via the "Additional Settings" field in the web interface. When the VPN's connection is established, the user defined script is executed with root privileges.

CVSS3: 8.8
2%
Низкий
почти 6 лет назад
github логотип
GHSA-6p3v-7x9x-66jr

Grandstream GXP1600 series firmware 1.0.4.152 and below is vulnerable to authenticated remote command execution when an attacker adds an OpenVPN up script to the phone's VPN settings via the "Additional Settings" field in the web interface. When the VPN's connection is established, the user defined script is executed with root privileges.

2%
Низкий
больше 3 лет назад

Уязвимостей на страницу