Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2020-5722 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: A critical SQL Injection flaw in the HTTP interface of Grandstream UCM6200.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: Unauthenticated Remote SQL Injection. πŸ“‰ **CWE**: Not explicitly mapped in data, but fundamentally a **Input Validation Failure** in HTTP request handling.…

Q3Who is affected? (Versions/Components)

🏒 **Affected Product**: Grandstream UCM6200 Series (IP PBX). πŸ“… **Vulnerable Versions**: β€’ Firmware < **1.0.19.20** β€’ Firmware < **1.0.20.17** βœ… **Safe**: Versions 1.0.19.20+ or 1.0.20.17+.

Q4What can hackers do? (Privileges/Data)

πŸ‘‘ **Privileges**: **Root** access! πŸ“§ **Data Impact**: 1. Execute arbitrary shell commands as root. 2. Inject HTML into password reset emails (phishing/credential theft). ⚠️ This is effectively full server control.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Auth Requirement**: **None**. It is **Unauthenticated**. 🌐 **Config**: Exploitable via crafted HTTP requests remotely. No login needed to trigger the injection. Extremely low barrier to entry for attackers.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ’» **Public Exploit**: **Yes**. πŸ“‚ **PoC Available**: β€’ Nuclei Template: `CVE-2020-5722.yaml` on ProjectDiscovery GitHub. β€’ PacketStorm Security references exist.…

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: 1. Check firmware version against <1.0.19.20 and <1.0.20.17. 2. Use **Nuclei** with the specific CVE template to scan for the SQL injection signature. 3.…

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Official Fix**: **Yes**. πŸ“¦ **Patch**: Update firmware to **1.0.19.20** or later, OR **1.0.20.17** or later. Grandstream released patches to address this specific SQL injection vector.

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: 1. **Block Access**: Restrict HTTP interface access via Firewall (WAF) to trusted IPs only. 2. **Input Filtering**: If possible, block SQL injection patterns in WAF rules. 3.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. 🚨 **Priority**: **Immediate Action Required**. Since it allows **Root Shell Access** without authentication, this is a high-severity remote code execution (RCE) vulnerability.…