A stack overflow vulnerability exists in the WebCam Server login functionality of GeoVision GV-VMS V20. Unauthenticated remote attackers can trigger the vulnerability by sending a specially crafted HTTP request to the affected service. Successful exploitation allows attackers to achieve arbitrary code execution on the affected surveillance system.
Remediation
Upgrade GeoVision GV-VMS V20 to the latest vendor-patched version as soon as possible. Block incoming connections to the WebCam Server from untrusted public networks. Audit system logs for any suspicious activity on affected deployments until remediation is complete.
TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.