目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2026-42369— GeoVision GV-VMS V20 WebCam Server 栈溢出漏洞

CVSS 10.0 · Critical EPSS 0.16% · P36
获取后续新漏洞提醒登录后订阅

一、 漏洞 CVE-2026-42369 基础信息

漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
GeoVision GV-VMS V20 WebCam Server stack overflow vulnerability
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
GV-VMS V20 is a Video Monitoring Software used to gather the feeds of many surveillance cameras and manage other security devices. It is a native application accessed locally, but it is also possible to enable remote access via the "WebCam Server" feature. Once enabled, it is possible to access to the management and monitoring feature via a regular Web interface. This webersever is another native application, compiled without ASLR, which makes exploitation much easier and more likely. Most of the features require authentication before being reachable and leverage a standard login page to grant access. However the `gvapi` endpoint uses its own authentication mechanism via an `HTTP Authorization` header. It supports both `Basic` authentication and the `Digest` modes of authentication.   #### Stack-overflow via unbound copy of base64 decoded string The `b64decoder` string is sized dynamically, but it is then copied to the `Buffer` stack variable one character at the time at [0], and there's no bound-check. As such, if the decoded string is bigger than 256 characters (the size of the `Buffer` variable) then a stack overflow occurs. Because the data can be fully controlled by an attacker and lack of ASLR, this vulnerability can easily be exploited to gain full code execution as SYSTEM on the machine running the service.
来源: 美国国家漏洞数据库 NVD
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
跨界内存写
来源: 美国国家漏洞数据库 NVD

神龙十问 — AI 深度分析

十问解析:根本原因、利用方式、修复建议、紧迫性。摘要免费,完整版需登录。

受影响产品

厂商产品影响版本CPE订阅
GeoVision Inc.GV-VMS V20.0.2 V20.0.2 -

二、漏洞 CVE-2026-42369 的公开POC

#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC

三、漏洞 CVE-2026-42369 的情报信息

Please 登录 to view more intelligence information

同批安全公告 · GeoVision Inc. · 2026-05-04 · 共 10 条

CVE-2026-423689.9 CRITICALGeoVision LPC2011/LPC2211 权限提升漏洞
CVE-2026-423649.9 CRITICALGeoVision LPC2011/LPC2211 Web界面OS命令注入漏洞
CVE-2026-71619.3 CRITICALGeoVision GV-IP Device Utility 设备认证加密不足漏洞
CVE-2026-423709.0 CRITICALGeoVision GV-VMS V20 WebCam Server 登录栈溢出漏洞
CVE-2026-73729.0 CRITICALGeoVision GV-VMS V20 WebCam Server 登录栈溢出漏洞
CVE-2026-423658.6 HIGHGeoVision LPC2011/LPC2211 Web界面可猜解会话Cookie漏洞
CVE-2026-423667.4 HIGHGeoVision LPC2011/LPC2211 Web界面ssi.cgi反射型XSS漏洞
CVE-2026-73717.4 HIGHGeoVision LPC2011/LPC2211 Web界面ssi.cgi反射型XSS漏洞
CVE-2026-423676.5 MEDIUMGeoVision LPC2011/2211 ssi.cgi权限提升漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2026-42369

暂无评论


发表评论