TopVuln

High-risk vulnerability digests

CVE-2026-42369

  • CRITICAL

Details

CVSS v3
10.0
NVD published
2026-05-04 01:16:04
EPSS
0.2% probability · 40.1th percentile — 2026-05-11
Affected versions
GV-VMS V20 with WebCam Server feature enabled
Summary
This unauthenticated stack overflow exists in the gvapi endpoint of GV-VMS V20's WebCam Server. Attackers can send a crafted base64 encoded payload that triggers an unbounded copy to a fixed-size stack buffer with no bounds checking. The web server is compiled without ASLR, making exploitation straightforward to achieve full SYSTEM level code execution.
Remediation
Disable the WebCam Server feature if it is not required for business operations. Apply the latest official security patch from GeoVision as soon as it becomes available. Restrict network access to the GV-VMS management interface to only trusted internal IP ranges.
Exploit info
No public exploit found yet.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.