Certain EOL GeoVision devices have an OS Command Injection vulnerability. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device. Moreover, this vulnerability has already been exploited by attackers, and we have received related reports.
References
| Link | Resource |
|---|---|
| https://www.twcert.org.tw/en/cp-139-8237-26d7a-2.html | Third Party Advisory |
| https://www.twcert.org.tw/tw/cp-132-8236-d4836-1.html | Third Party Advisory |
| https://www.akamai.com/blog/security-research/active-exploitation-mirai-geovision-iot-botnet | Exploit Third Party Advisory |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-11120 | US Government Resource |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
History
No history.
Information
Published : 2024-11-15 02:15
Updated : 2025-10-30 20:09
NVD link : CVE-2024-11120
Mitre link : CVE-2024-11120
CVE.ORG link : CVE-2024-11120
JSON object : View
Products Affected
geovision
- gv-vs11
- gvlx_4_firmware
- gvlx_4
- gv-dsp_lpr
- gv-dsp_lpr_firmware
- gv-vs11_firmware
- gv-vs12
- gv-vs12_firmware
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
