CVE-2021-37915
📋 TL;DR
This vulnerability allows attackers with access to the limited configuration shell on Grandstream HT801 Analog Telephone Adaptors to set a malicious gdb_debug_server variable. After device reboot, this causes the device to download and execute arbitrary scripts from attacker-controlled hosts, potentially leading to complete device compromise. All HT801 devices running firmware versions before 1.0.29.8 are affected.
💻 Affected Systems
- Grandstream HT801 Analog Telephone Adaptor
📦 What is this software?
Ht801 Firmware by Grandstream
⚠️ Risk & Real-World Impact
Worst Case
Complete device takeover allowing persistent backdoor installation, credential theft, network pivoting, and use in botnets or as a foothold for further attacks.
Likely Case
Remote code execution leading to device compromise, unauthorized configuration changes, and potential use as a network pivot point.
If Mitigated
Limited impact if devices are isolated from untrusted networks and shell access is restricted, though vulnerability remains present.
🎯 Exploit Status
Exploitation requires access to the configuration shell first, which may be obtained through other means or physical access. Public exploit details exist.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.0.29.8
Vendor Advisory: http://firmware.grandstream.com/BETA/Release_Note_HT80x_1.0.29.8.pdf
Restart Required: Yes
Instructions:
1. Download firmware version 1.0.29.8 from Grandstream's official website. 2. Log into the HT801 web interface. 3. Navigate to Maintenance > Upgrade. 4. Upload the firmware file. 5. Wait for upgrade to complete and device to reboot.
🔧 Temporary Workarounds
Restrict Configuration Shell Access
allLimit physical and network access to the device's configuration interface to prevent attackers from setting the malicious variable.
Network Segmentation
allIsolate HT801 devices in separate VLANs or network segments to limit potential lateral movement if compromised.
🧯 If You Can't Patch
- Isolate affected devices from internet and untrusted networks
- Implement strict access controls to prevent unauthorized configuration shell access
🔍 How to Verify
Check if Vulnerable:
Check firmware version via web interface: Login > Status > System Status > Firmware Version. If version is below 1.0.29.8, device is vulnerable.
Check Version:
Via web interface: Check Status > System Status > Firmware Version
Verify Fix Applied:
After patching, verify firmware version shows 1.0.29.8 or higher in the web interface.
📡 Detection & Monitoring
Log Indicators:
- Unusual configuration changes
- Unexpected reboots
- Network connections to unknown external hosts
Network Indicators:
- HT801 devices downloading files from unusual external IPs
- Unexpected outbound connections from HT801 devices
SIEM Query:
device.vendor:Grandstream AND device.model:HT801 AND (event.action:configuration_change OR network.destination.ip:external)
🔗 References
- http://firmware.grandstream.com/BETA/Release_Note_HT80x_1.0.29.8.pdf
- http://www.grandstream.com/products/gateways-and-atas/analog-telephone-adaptors/product/ht801
- https://www.secforce.com/blog/exploiting-grandstream-ht801-ata-cve-2021-37748-cve-2021-37915/
- http://firmware.grandstream.com/BETA/Release_Note_HT80x_1.0.29.8.pdf
- http://www.grandstream.com/products/gateways-and-atas/analog-telephone-adaptors/product/ht801
- https://www.secforce.com/blog/exploiting-grandstream-ht801-ata-cve-2021-37748-cve-2021-37915/