CVE-2025-28170
BaseFortify
Publication date: 2025-07-29
Last updated on: 2025-08-06
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| grandstream | gxp1628_firmware | to 1.0.4.130 (inc) |
| grandstream | gxp1628 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-548 | The product inappropriately exposes a directory listing with an index of all the resources located inside of the directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-28170 is an incorrect access control vulnerability in the Grandstream GXP1628 VoIP phone firmware up to version 1.0.4.130. The device has directory listing enabled on its web server, which allows an attacker to access and enumerate sensitive directories and files by navigating to specific paths such as /webapp/, /cgi-bin/, and /json/contents/. This unauthorized access exposes configuration files, logs, and other critical data that should not be publicly accessible. [1]
How can this vulnerability impact me? :
This vulnerability can lead to unauthorized disclosure of sensitive information stored on the device, such as configuration files and logs. Attackers can use this information to further compromise the system or launch additional attacks. The exposure of critical data may result in loss of confidentiality and potentially impact the security and operation of the affected VoIP device. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by attempting to access specific directory paths on the device's web server to see if directory listing is enabled. For example, you can use a web browser or command-line tools like curl or wget to request URLs such as http://<device_ip>/webapp/, http://<device_ip>/cgi-bin/, or http://<device_ip>/json/contents/. If directory listings or sensitive files are returned, the device is vulnerable. Example commands: curl http://<device_ip>/webapp/, curl http://<device_ip>/cgi-bin/, curl http://<device_ip>/json/contents/ [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include disabling directory listing in the device's web server configuration and applying any available firmware updates from Grandstream that address this vulnerability. Check Grandstream's official support website for the latest firmware versions that may have fixed this issue. [1]