### [CVE-2021-37748](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37748) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen) ### Description Multiple buffer overflows in the limited configuration shell (/sbin/gs_config) on Grandstream HT801 devices before 1.0.29 allow remote authenticated users to execute arbitrary code as root via a crafted manage_if setting, thus bypassing the intended restrictions of this shell and taking full control of the device. There are default weak credentials that can be used to authenticate. ### POC #### Reference - https://www.secforce.com/blog/exploiting-grandstream-ht801-ata-cve-2021-37748-cve-2021-37915/ #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/SECFORCE/CVE-2021-37748 - https://github.com/nomi-sec/PoC-in-GitHub