TopVuln

High-risk vulnerability digests

CVE-2026-7841

  • HIGH

Details

CVSS v3
8.8
NVD published
2026-05-06 08:16:04
EPSS
0.4% probability · 58.0th percentile — 2026-05-11
Affected versions
GeoVision GV-ASWeb 6.2.0
Summary
A remote code execution vulnerability exists in the Notification Settings component of GeoVision GV-ASWeb. An authenticated attacker with System Setting permissions can send a crafted malicious HTTP POST request to the backend ASWebCommon.srf endpoint. The request bypasses existing frontend restrictions to allow arbitrary command execution on the target server.
Remediation
Apply the latest official security patch released by GeoVision for GV-ASWeb. Restrict network access to the GV-ASWeb backend endpoint to only trusted, authorized IP ranges. Revoke unnecessary System Setting permissions from non-admin users to reduce the attack surface.
Exploit info
No public exploit found yet.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.