CVE-2025-28170
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-29

Last updated on: 2025-08-06

Assigner: MITRE

Description
Grandstream Networks GXP1628 <=1.0.4.130 is vulnerable to Incorrect Access Control. The device is configured with directory listing enabled, allowing unauthorized access to sensitive directories and files.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-29
Last Modified
2025-08-06
Generated
2026-05-07
AI Q&A
2025-07-29
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
grandstream gxp1628_firmware to 1.0.4.130 (inc)
grandstream gxp1628 *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-548 The product inappropriately exposes a directory listing with an index of all the resources located inside of the directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-28170 is an incorrect access control vulnerability in the Grandstream GXP1628 VoIP phone firmware up to version 1.0.4.130. The device has directory listing enabled on its web server, which allows an attacker to access and enumerate sensitive directories and files by navigating to specific paths such as /webapp/, /cgi-bin/, and /json/contents/. This unauthorized access exposes configuration files, logs, and other critical data that should not be publicly accessible. [1]


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized disclosure of sensitive information stored on the device, such as configuration files and logs. Attackers can use this information to further compromise the system or launch additional attacks. The exposure of critical data may result in loss of confidentiality and potentially impact the security and operation of the affected VoIP device. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting to access specific directory paths on the device's web server to see if directory listing is enabled. For example, you can use a web browser or command-line tools like curl or wget to request URLs such as http://<device_ip>/webapp/, http://<device_ip>/cgi-bin/, or http://<device_ip>/json/contents/. If directory listings or sensitive files are returned, the device is vulnerable. Example commands: curl http://<device_ip>/webapp/, curl http://<device_ip>/cgi-bin/, curl http://<device_ip>/json/contents/ [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include disabling directory listing in the device's web server configuration and applying any available firmware updates from Grandstream that address this vulnerability. Check Grandstream's official support website for the latest firmware versions that may have fixed this issue. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart