Certain EOL GeoVision devices have an OS Command Injection vulnerability. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device. Moreover, this vulnerability has already been exploited by attackers, and we have received related reports.
References
| Link | Resource |
|---|---|
| https://www.twcert.org.tw/en/cp-139-8237-26d7a-2.html | Third Party Advisory |
| https://www.twcert.org.tw/tw/cp-132-8236-d4836-1.html | Third Party Advisory |
| https://www.akamai.com/blog/security-research/active-exploitation-mirai-geovision-iot-botnet | Exploit Third Party Advisory |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-11120 | US Government Resource |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
History
30 Oct 2025, 20:09
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-11120 - US Government Resource |
Information
Published : 2024-11-15 02:15
Updated : 2025-10-30 20:09
NVD link : CVE-2024-11120
Mitre link : CVE-2024-11120
CVE.ORG link : CVE-2024-11120
JSON object : View
Products Affected
geovision
- gv-vs11_firmware
- gv-vs11
- gv-dsp_lpr_firmware
- gvlx_4
- gvlx_4_firmware
- gv-dsp_lpr
- gv-vs12_firmware
- gv-vs12
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
