Loading
Generated remediation guidance and an executive summary. No account required.
an attacker with knowledge of user/pass of Grandstream GSD3710 in its 1.0.11.13 version, could overflow the stack since it doesn't check the param length before use the strcopy instruction. The explotation of this vulnerability may lead an attacker to execute a shell with full access.
Use CWE-121, Grandstream vendor hub and Gds3710 Firmware product page to widen CVE-2022-2025 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2022-2070 for nearby disclosures in the same product family.