Impact
A stack overflow flaw in GeoVision GV‑VMS V20.0.2’s WebCam Server Login allows an unauthenticated attacker to send a crafted HTTP request that overflows internal buffers for the username and password fields. The overflow can be triggered when either field exceeds 40 characters, leading to memory corruption and potentially arbitrary code execution with SYSTEM privileges on the host running the service.
Affected Systems
The vulnerability affects GeoVision Inc.’s GV‑VMS V20.0.2 for Windows systems. Patch version 21.0.0 has been released to remediate the issue; only the 20.0.2 release is currently vulnerable.
Risk and Exploitability
With a CVSS score of 9, the flaw is high risk. EPSS data is not available, but the vulnerability is publicly documented and could be exploited through a simple unauthenticated HTTP request without additional credentials. It is not listed in CISA’s KEV catalog, yet the combination of a network vector and full SYSTEM execution still warrants urgent attention.
OpenCVE Enrichment