PT-2026-36741 · Geovision · Gv-Vms V20
Kelly Patterson
+2
·
Published
2026-05-04
·
Updated
2026-05-04
·
CVE-2026-7372
CVSS v3.1
9.0
Critical
| Vector | AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
GeoVision GV-VMS V20 version 20.0.2
Description
A stack overflow exists in the WebCam Server Login functionality. An unauthenticated attacker can send a specially crafted HTTP request to trigger the issue, potentially leading to arbitrary code execution with SYSTEM privileges. The flaw occurs because the
sscanf() function is used to split the Buffer variable into username and password variables without limiting the size of the extracted content. If either the username or password decoded from the authorization string exceeds 40 characters, a stack overflow occurs.Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Memory Corruption
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Gv-Vms V20