cve/2016/CVE-2016-1518.md

18 lines
950 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2016-1518](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1518)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The auto-provisioning mechanism in the Grandstream Wave app 1.0.1.26 and earlier for Android and Grandstream Video IP phones allows man-in-the-middle attackers to spoof provisioning data and consequently modify device functionality, obtain sensitive information from system logs, and have unspecified other impact by leveraging failure to use an HTTPS session for downloading configuration files from http://fm.grandstream.com/gs/.
### POC
#### Reference
- http://packetstormsecurity.com/files/136280/Grandstream-Wave-1.0.1.26-Man-In-The-Middle.html
#### Github
- https://github.com/ARPSyndicate/cvemon