CVE-2024-11120

Certain EOL GeoVision devices have an OS Command Injection vulnerability. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device. Moreover, this vulnerability has already been exploited by attackers, and we have received related reports.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:geovision:gv-vs12_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:geovision:gv-vs12:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:geovision:gv-vs11_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:geovision:gv-vs11:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:geovision:gv-dsp_lpr_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:geovision:gv-dsp_lpr:3.0:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:geovision:gvlx_4_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:geovision:gvlx_4:2.0:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:geovision:gvlx_4_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:geovision:gvlx_4:3.0:*:*:*:*:*:*:*

History

09 May 2025, 14:22

Type Values Removed Values Added
References () https://www.akamai.com/blog/security-research/active-exploitation-mirai-geovision-iot-botnet - () https://www.akamai.com/blog/security-research/active-exploitation-mirai-geovision-iot-botnet - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

07 May 2025, 14:15

Type Values Removed Values Added
References
  • () https://www.akamai.com/blog/security-research/active-exploitation-mirai-geovision-iot-botnet -

05 Dec 2024, 15:30

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : unknown
First Time Geovision gv-dsp Lpr Firmware
Geovision gv-vs11
Geovision gv-vs12 Firmware
Geovision gv-vs12
Geovision gv-vs11 Firmware
Geovision gv-dsp Lpr
Geovision gvlx 4 Firmware
Geovision
Geovision gvlx 4
CWE CWE-78
CPE cpe:2.3:h:geovision:gvlx_4:2.0:*:*:*:*:*:*:*
cpe:2.3:h:geovision:gvlx_4:3.0:*:*:*:*:*:*:*
cpe:2.3:o:geovision:gv-dsp_lpr_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:geovision:gv-vs11:-:*:*:*:*:*:*:*
cpe:2.3:o:geovision:gv-vs11_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:geovision:gvlx_4_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:geovision:gv-vs12:-:*:*:*:*:*:*:*
cpe:2.3:h:geovision:gv-dsp_lpr:3.0:*:*:*:*:*:*:*
cpe:2.3:o:geovision:gv-vs12_firmware:-:*:*:*:*:*:*:*
References () https://www.twcert.org.tw/tw/cp-132-8236-d4836-1.html - () https://www.twcert.org.tw/tw/cp-132-8236-d4836-1.html - Third Party Advisory
References () https://www.twcert.org.tw/en/cp-139-8237-26d7a-2.html - () https://www.twcert.org.tw/en/cp-139-8237-26d7a-2.html - Third Party Advisory

15 Nov 2024, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-15 02:15

Updated : 2025-05-09 14:22


NVD link : CVE-2024-11120

Mitre link : CVE-2024-11120


JSON object : View

Products Affected

geovision

  • gv-dsp_lpr
  • gv-vs12_firmware
  • gv-vs11_firmware
  • gvlx_4_firmware
  • gv-vs11
  • gvlx_4
  • gv-vs12
  • gv-dsp_lpr_firmware
CWE

No CWE.