Loading
Generated remediation guidance and an executive summary. No account required.
In Grandstream GSD3710 in its 1.0.11.13 version, it's possible to overflow the stack since it doesn't check the param length before using the sscanf instruction. Because of that, an attacker could create a socket and connect with a remote IP:port by opening a shell and getting full access to the system. The exploit affects daemons dbmng and logsrv that are running on ports 8000 and 8001 by default.
Use CWE-121, Grandstream vendor hub and Gds3710 Firmware product page to widen CVE-2022-2070 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2022-2025 for nearby disclosures in the same product family.