Skip to main content

CVE-2022-2070: CWE-121 Stack-based Buffer Overflow in Grandstream Grandstream GSD3710

Critical
VulnerabilityCVE-2022-2070cvecve-2022-2070cwe-121
Published: Fri Sep 23 2022 (09/23/2022, 15:06:57 UTC)
Source: CVE
Vendor/Project: Grandstream
Product: Grandstream GSD3710

Description

In Grandstream GSD3710 in its 1.0.11.13 version, it's possible to overflow the stack since it doesn't check the param length before using the sscanf instruction. Because of that, an attacker could create a socket and connect with a remote IP:port by opening a shell and getting full access to the system. The exploit affects daemons dbmng and logsrv that are running on ports 8000 and 8001 by default.

AI-Powered Analysis

AILast updated: 07/08/2025, 07:27:34 UTC

Technical Analysis

CVE-2022-2070 is a critical stack-based buffer overflow vulnerability identified in the Grandstream GSD3710 device, specifically affecting version 1.0.11.13. The root cause of the vulnerability lies in improper input validation: the device's software uses the sscanf function without verifying the length of the input parameters. This flaw allows an attacker to overflow the stack memory by sending specially crafted input to the affected services. The vulnerability impacts two daemons, dbmng and logsrv, which listen on TCP ports 8000 and 8001 by default. Exploiting this vulnerability enables an attacker to create a socket connection to a remote IP and port, effectively opening a shell on the device. This shell access grants the attacker full control over the system, compromising confidentiality, integrity, and availability. The CVSS v3.1 base score of 9.8 reflects the critical severity, with network attack vector, no required privileges or user interaction, and full system compromise potential. Although no public exploits are currently known in the wild, the vulnerability's characteristics make it highly exploitable and dangerous if weaponized. The affected product, Grandstream GSD3710, is a specialized device likely used in enterprise or telecommunication environments, where such vulnerabilities can have significant operational impacts.

Potential Impact

For European organizations, the impact of this vulnerability can be severe. Organizations using Grandstream GSD3710 devices in their telephony or network infrastructure risk full system compromise if exploited. This can lead to unauthorized access to sensitive communications, interception or manipulation of data, disruption of services, and potential lateral movement within the network. Given the critical nature of the vulnerability, attackers could deploy malware, exfiltrate data, or disrupt business operations. The lack of authentication requirements and user interaction lowers the barrier for exploitation, increasing the risk of automated or remote attacks. For sectors such as finance, healthcare, government, and critical infrastructure within Europe, the exploitation of this vulnerability could result in significant operational, reputational, and regulatory consequences, including violations of GDPR due to data breaches.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately identify any Grandstream GSD3710 devices running version 1.0.11.13 within their networks. Since no official patches are currently linked, organizations should contact Grandstream support for firmware updates or advisories. In the interim, restrict network access to the affected ports (8000 and 8001) by implementing strict firewall rules limiting access to trusted management networks only. Employ network segmentation to isolate these devices from critical infrastructure and sensitive data environments. Monitor network traffic for unusual connections or attempts to access these ports, using intrusion detection/prevention systems tuned for suspicious activity. Disable or restrict the dbmng and logsrv services if feasible, or replace affected devices with updated or alternative solutions. Additionally, implement strong network access controls and continuous vulnerability scanning to detect any attempts to exploit this vulnerability. Maintain up-to-date asset inventories to ensure rapid response to newly disclosed vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCIBE
Date Reserved
2022-06-13T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f6ee00acd01a2492646f5

Added to database: 5/22/2025, 6:37:20 PM

Last enriched: 7/8/2025, 7:27:34 AM

Last updated: 8/7/2025, 2:29:32 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats