Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14186: Basic Cross Site Scripting in Grandstream GXP1625

0
Medium
VulnerabilityCVE-2025-14186cvecve-2025-14186
Published: Sun Dec 07 2025 (12/07/2025, 07:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Grandstream
Product: GXP1625

Description

A security flaw has been discovered in Grandstream GXP1625 1.0.7.4. The impacted element is an unknown function of the file /cgi-bin/api.values.post of the component Network Status Page. Performing manipulation of the argument vpn_ip results in basic cross site scripting. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/07/2025, 07:51:30 UTC

Technical Analysis

CVE-2025-14186 identifies a basic cross-site scripting vulnerability in the Grandstream GXP1625 IP phone firmware version 1.0.7.4. The vulnerability resides in an unspecified function within the /cgi-bin/api.values.post CGI endpoint, specifically in the handling of the vpn_ip argument on the Network Status Page. By manipulating this parameter, an attacker can inject arbitrary JavaScript code that executes in the context of the device's web interface. The vulnerability is remotely exploitable without requiring authentication, although user interaction is necessary to trigger the malicious script, classifying it as a reflected or stored XSS depending on the context. The exploit allows attackers to perform actions such as session hijacking, credential theft, or redirecting users to malicious sites, compromising the confidentiality and integrity of the device and potentially the broader network. The vendor was contacted prior to public disclosure but did not respond or provide a patch, increasing the risk of exploitation. The CVSS v4.0 score is 5.1 (medium severity), reflecting the ease of remote exploitation but limited impact on availability and requiring user interaction. No known exploits in the wild have been reported yet, but the public availability of the exploit code raises the likelihood of attacks. The vulnerability affects a widely deployed VoIP device used in enterprise telephony, making it a relevant concern for organizations relying on Grandstream hardware for communication.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of communications and device management. Exploitation could lead to unauthorized access to the device’s web interface, enabling attackers to hijack sessions, steal credentials, or inject malicious content that could spread within the corporate network. This is particularly critical for sectors heavily dependent on VoIP communications such as finance, healthcare, and government agencies. Compromised IP phones could serve as entry points for lateral movement or espionage. Additionally, the lack of vendor response and patch availability increases exposure time. Organizations with remote or distributed workforces using these devices may face higher risk due to broader attack surfaces. While availability impact is low, the potential for data leakage and trust erosion in communication systems is significant. The public exploit availability may lead to opportunistic attacks, especially targeting less-secured networks or devices with default configurations.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement strict network segmentation to isolate IP phones from critical infrastructure and sensitive data networks. Access to the device’s web interface should be restricted to trusted management networks using firewall rules or VPNs. Employ web application firewalls (WAFs) capable of detecting and blocking XSS payloads targeting the /cgi-bin/api.values.post endpoint. Regularly audit and monitor device logs for unusual access patterns or injection attempts. Disable or limit web interface access if not required for daily operations. Where possible, replace or upgrade affected devices to models or firmware versions not impacted by this vulnerability, even if official patches are unavailable. Educate users about the risks of interacting with suspicious links or prompts originating from IP phone interfaces. Implement multi-factor authentication for device management portals if supported. Finally, maintain an incident response plan to quickly address any detected exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-06T14:01:21.254Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69352f32be54460d664f24ea

Added to database: 12/7/2025, 7:39:30 AM

Last enriched: 12/7/2025, 7:51:30 AM

Last updated: 12/7/2025, 3:46:19 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats