TopVuln

High-risk vulnerability digests

CVE-2026-7372

  • CRITICAL

Details

CVSS v3
9.0
NVD published
2026-05-04 01:16:04
EPSS
0.2% probability · 45.6th percentile — 2026-05-12
Affected versions
GeoVision GV-VMS V20 20.0.2
Summary
This is a stack-based buffer overflow vulnerability in the web login functionality of GeoVision GV-VMS surveillance software. The vulnerability is caused by an unconstrained sscanf call that does not limit input size when parsing login credentials. Unauthenticated remote attackers can trigger this via a crafted HTTP request, potentially leading to full SYSTEM-level arbitrary code execution.
Remediation
Apply the latest security patch from GeoVision for affected GV-VMS V20 installations. Restrict public access to the GV-VMS web server login endpoint to only trusted IP ranges. Check the official GeoVision advisory for additional workarounds if patching is not immediately possible.
Exploit info
No public exploit found yet.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.