Impact
The vulnerability is a classic stack overflow caused by an unbounded copy of a base64‑decoded string into a 256‑byte buffer in the gvapi endpoint of GeoVision VMS V20. The buffer overflows when the decoded payload exceeds 256 characters, and because the application is compiled without ASLR, the overflow can be reliably predicted, allowing an attacker to inject and execute arbitrary code with SYSTEM privileges. This flaw is identified as CWE‑787, a classic out‑of‑bounds write.
Affected Systems
GeoVision Inc. GV‑VMS V20.0.2 running on Windows is affected. The vulnerability exists when the WebCam Server feature is enabled, exposing the gvapi endpoint over HTTP or HTTPS. The patched version, GV‑VMS V21.0.0, removes the flaw.
Risk and Exploitability
The CVSS score of 10 indicates the highest severity, and the EPSS score is not available, but the lack of address space layout randomization and the ability to control the overflown data make exploitation highly likely for an authenticated user. The vulnerability is not listed in CISA KEV, but the high CVSS and the remote access vector via the WebCam Server feature mean that if an attacker can obtain or guess credentials for the gvapi endpoint, code execution is almost guaranteed. The risk remains high until the system is upgraded or the remote feature is disabled.
OpenCVE Enrichment