GeoVision GV-ASWeb with the version 6.1.2.0 or less (fixed in 6.2.0), contains a Remote Code Execution (RCE) vulnerability within its Notification Settings feature. An authenticated attacker with "System Settings" privileges in ASWeb can exploit this flaw to execute arbitrary commands on the server, leading to a full system compromise.
Metrics
Affected Vendors & Products
References
History
Wed, 19 Mar 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | GeoVision GV-ASWeb with the version 6.1.2.0 or less, contains a Remote Code Execution (RCE) vulnerability within its Notification Settings feature. An authenticated attacker with "System Settings" privileges in ASWeb can exploit this flaw to execute arbitrary commands on the server, leading to a full system compromise. | GeoVision GV-ASWeb with the version 6.1.2.0 or less (fixed in 6.2.0), contains a Remote Code Execution (RCE) vulnerability within its Notification Settings feature. An authenticated attacker with "System Settings" privileges in ASWeb can exploit this flaw to execute arbitrary commands on the server, leading to a full system compromise. |
Mon, 17 Mar 2025 06:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 04 Mar 2025 03:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 28 Feb 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-94 | |
Metrics |
cvssV3_1
|
Thu, 27 Feb 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | GeoVision GV-ASWeb with the version 6.1.2.0 or less, contains a Remote Code Execution (RCE) vulnerability within its Notification Settings feature. An authenticated attacker with "System Settings" privileges in ASWeb can exploit this flaw to execute arbitrary commands on the server, leading to a full system compromise. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-02-27T00:00:00.000Z
Updated: 2025-03-19T13:35:23.085Z
Reserved: 2025-02-07T00:00:00.000Z
Link: CVE-2025-26264

Updated: 2025-02-28T17:14:13.788Z

Status : Awaiting Analysis
Published: 2025-02-27T22:15:38.947
Modified: 2025-03-19T14:15:39.440
Link: CVE-2025-26264

No data.