PT-2026-36737 · Unknown · Gv-Vms V20
Kelly Patterson
+2
·
Published
2026-05-04
·
Updated
2026-05-04
·
CVE-2026-42369
CVSS v3.1
10
Critical
| Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
GV-VMS V20
Description
The WebCam Server feature in GV-VMS allows remote access to management and monitoring via a web interface. The
gvapi endpoint utilizes a custom authentication mechanism supporting Basic and Digest modes. A stack overflow occurs when the b64decoder string is copied to the Buffer stack variable without bound-checking; if the decoded string exceeds 256 characters, it overflows the buffer. Since the web server is compiled without Address Space Layout Randomization (ASLR)—a security technique that randomly arranges address spaces of key data areas to prevent memory corruption attacks—an attacker can control the data to achieve full code execution with SYSTEM privileges.Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Memory Corruption
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Gv-Vms V20