No advisories yet.
Solution
GeoVision GV-VMS version V21.0.0 has patched the reported vulnerability. User is recommended to download the update from GeoVision's offical website (https://www.geovision.com.tw/download/product/GV-VMS%20V20) or contact GeoVision Support team
Workaround
No workaround given by the vendor.
Mon, 04 May 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A stack overflow vulnerability exists in the WebCam Server Login functionality of GeoVision GV-VMS V20 20.0.2. A specially crafted HTTP request can lead to an arbitrary code execution. An attacker can make an unauthenticated HTTP request to trigger this vulnerability. | |
| Title | GeoVision GV-VMS V20 WebCam Server Login stack overflow vulnerability | |
| First Time appeared |
Geovision Inc.
Geovision Inc. gv-vms V20.0.2 |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:geovision_inc.:gv-vms_v20.0.2:20.0.2:*:windows:*:*:*:*:* cpe:2.3:a:geovision_inc.:gv-vms_v20.0.2:21.0.0:*:windows:*:*:*:*:* |
|
| Vendors & Products |
Geovision Inc.
Geovision Inc. gv-vms V20.0.2 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GV
Published:
Updated: 2026-05-04T00:48:05.154Z
Reserved: 2026-04-26T23:39:08.350Z
Link: CVE-2026-42370
No data.
Status : Received
Published: 2026-05-04T01:16:04.310
Modified: 2026-05-04T01:16:04.310
Link: CVE-2026-42370
No data.
OpenCVE Enrichment
Updated: 2026-05-04T02:30:34Z