{"id":43793,"date":"2026-02-20T01:38:27","date_gmt":"2026-02-19T17:38:27","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/20\/flaw-in-grandstream-voip-phones-allows-stealthy-eavesdropping\/"},"modified":"2026-02-20T01:38:27","modified_gmt":"2026-02-19T17:38:27","slug":"flaw-in-grandstream-voip-phones-allows-stealthy-eavesdropping","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/20\/flaw-in-grandstream-voip-phones-allows-stealthy-eavesdropping\/","title":{"rendered":"Flaw in Grandstream VoIP phones allows stealthy eavesdropping"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2026\/02\/19\/Grandstream.jpg\" width=\"1600\" alt=\"Flaw in Grandstream VoIP phones allows stealthy eavesdropping\"><\/p>\n<p>A critical vulnerability in Grandstream GXP1600 series VoIP phones allows a remote, unauthenticated attacker&nbsp;to gain root privileges and silently eavesdrop on communications.<\/p>\n<p>VoIP communication equipment from Grandstream Networks is being used by small and medium businesses. The maker&#8217;s <a href=\"http:\/\/www.grandstream.com\/products\/ip-voice-telephony-gxp-series-ip-phones\/gxp-series-high-end-ip-phones\/product\/gxp2170\" target=\"_blank\" rel=\"nofollow noopener\">GXP product line<\/a> is part of the company&#8217;s&nbsp;high-end&nbsp;offering&nbsp;for businesses, schools, hotels, and Internet Telephony Service Providers (ITSP) around the world.<\/p>\n<p>The vulnerability is tracked as&nbsp;CVE-2026-2329 and received a critical severity score of 9.3. It impacts&nbsp;the following six models of the GXP1600 series of devices that run firmware versions prior to 1.0.7.81:<\/p>\n<div align=\"center\" style=\"width:98%; margin:0 auto; text-align:center; padding:4px; background:#f0f0f0; border:1px solid #ccc; border-radius:6px;\">  <a href=\"https:\/\/www.wiz.io\/lp\/ai-security-board-report-template?utm_source=bleepingcomputer&amp;utm_medium=display&amp;utm_campaign=FY26Q4_INB_FORM_AI-Security-Board-Report-Template&amp;sfcid=701Vh00000Wn7E1IAJ&amp;utm_term=FY27-bleepingcomputer-article-970x250&amp;utm_content=AI-Board-Report\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/w\/ai-security-board-report-template.jpg\" style=\"margin-top: 0px;\" alt=\"Flaw in Grandstream VoIP phones allows stealthy eavesdropping\"><\/a> <\/div>\n<ul>\n<li>GXP1610<\/li>\n<li>GXP1615<\/li>\n<li>GXP1620<\/li>\n<li>GXP1625<\/li>\n<li>GXP1628<\/li>\n<li>GXP1630<\/li>\n<\/ul>\n<p>Even if a vulnerable device is not directly reachable over the public internet, an attacker can pivot to it from another host on the network. Exploitation is silent, and everything works as expected.<\/p>\n<p>In a technical report,&nbsp;<a href=\"https:\/\/www.rapid7.com\/blog\/post\/ve-phone-listening-cold-war-vulnerability-modern-voip\/\" target=\"_blank\" rel=\"nofollow noopener\">Rapid7 researchers<\/a> explain that the problem is in the device&rsquo;s web-based API service (\/cgi-bin\/api.values.get), which is accessible without authentication in the default configuration.<\/p>\n<p>The API accepts a &lsquo;request&rsquo; parameter containing colon-delimited identifiers, which is parsed into a 64-byte stack buffer without performing a length check when copying characters into the buffer.<\/p>\n<p>Because of this, an attacker supplying overly long input can cause a stack overflow, overwriting adjacent memory to gain&nbsp;control over multiple CPU registers, such as the Program Counter.<\/p>\n<p>Rapid7 researchers developed a working Metasploit module to demonstrate unauthenticated remote code execution as root by exploiting CVE-2026-2329.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"542\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/February\/metasploit.jpg\" width=\"900\" alt=\"Flaw in Grandstream VoIP phones allows stealthy eavesdropping\"><figcaption><strong>Metasploit module<\/strong><br \/><em>Source: Rapid7<\/em><\/figcaption><\/figure>\n<\/div>\n<p>Exploitation enables arbitrary OS command execution, extracting&nbsp;stored credentials of local users and SIP accounts, and reconfiguring the device to&nbsp;use a malicious SIP proxy that allows eavesdropping on calls.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"200\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/flaw-in-grandstream-voip-phones-allows-stealthy-eavesdropping\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" width=\"900\" data-src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1100723\/grandstream_gxp1600_rce_Rapid7.png\" alt=\"Flaw in Grandstream VoIP phones allows stealthy eavesdropping\"><figcaption><strong>Stealing credentials<\/strong><br \/><em>Source: Rapid7<\/em><\/figcaption><\/figure>\n<\/div>\n<p>Rapid7 researchers say that successful exploitation requires writing multiple null bytes to construct a return-oriented programming (ROP) chain. However,&nbsp;CVE-2026-2329 permits writing of only one null terminator byte during the overflow.<\/p>\n<p>To bypass the restriction, the researchers used multiple colon-separated identifiers to trigger the overflow repeatedly and write null bytes multiple times.<\/p>\n<p>&ldquo;Every time a colon is encountered, the overflow can be triggered a subsequent time via the next identifier,&rdquo; <a href=\"https:\/\/www.rapid7.com\/blog\/post\/ve-cve-2026-2329-critical-unauthenticated-stack-buffer-overflow-in-grandstream-gxp1600-voip-phones-fixed\/\" target=\"_blank\" rel=\"nofollow noopener\">explain the researchers<\/a>&nbsp;in the technical writeup.<\/p>\n<p>&ldquo;We can leverage this, and the ability to write a single null byte as the last character in the current identifier being processed, to write multiple null bytes during exploitation.&rdquo;<\/p>\n<p>The researchers contacted Grandstream on January 6&nbsp;and again on January 20 after receiving no response.<\/p>\n<p>Eventually, Grandstream fixed the issue on February 3, with the release of <a href=\"https:\/\/www.grandstream.com\/support\/firmware\" target=\"_blank\" rel=\"nofollow noopener\">firmware version 1.0.7.81<\/a>.<\/p>\n<p>Technical details and a module for the Metasploit&nbsp;penetration testing and exploitation framework. Users of vulnerable Grandstream products are strongly advised to apply available security updates as soon as possible.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&amp;utm_medium=paid_media&amp;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/flaw-in-grandstream-voip-phones-allows-stealthy-eavesdropping\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/www.bleepstatic.com\/c\/t\/tines-in-art-square.jpg\" alt=\"Flaw in Grandstream VoIP phones allows stealthy eavesdropping\"><\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&amp;utm_medium=paid_media&amp;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">The future of IT infrastructure is here<\/a><\/h2>\n<p>Modern IT infrastructure moves faster than manual workflows can handle.<\/p>\n<p>In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.<\/p>\n<p>          <button><a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&amp;utm_medium=paid_media&amp;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">Get the guide<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-keenadu-backdoor-found-in-android-firmware-google-play-apps\/\">New Keenadu backdoor found in Android firmware, Google Play apps<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/one-threat-actor-responsible-for-83-percent-of-recent-ivanti-rce-attacks\/\">One threat actor responsible for 83% of recent Ivanti RCE attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-orders-feds-to-patch-beyondtrust-flaw-within-three-days\/\">CISA gives feds 3 days to patch actively exploited BeyondTrust flaw<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-flags-microsoft-configmgr-rce-flaw-as-exploited-in-attacks\/\">CISA flags critical Microsoft SCCM flaw as exploited in attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/critical-beyondtrust-rce-flaw-now-exploited-in-attacks-patch-now\/\">Critical BeyondTrust RCE flaw now exploited in attacks, patch now<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A critical vulnerability in Grandstream GXP1600 series  [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-43793","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43793","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=43793"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43793\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=43793"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=43793"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=43793"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}