CVE-2024-6047

Known Exploited Public Exploit
GeoVision EOL device - OS Command Injection

Description

Certain EOL GeoVision devices fail to properly filter user input for the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device.

Remediation

Solution:

  • All affected products are no longer in surport. Please retire or replace them.

Category

9.8
CVSS
Severity: Critical
CVSS 3.1 •
EPSS 75.40% Top 5%
KEV Since 
Third-Party Advisory org.tw Third-Party Advisory org.tw Third-Party Advisory akamai.com
Affected: GeoVision GV_DSP_LPR_V2
Affected: GeoVision GV_IPCAMD_GV_BX1500
Affected: GeoVision GV_IPCAMD_GV_CB220
Affected: GeoVision GV_IPCAMD_GV_EBL1100
Affected: GeoVision GV_IPCAMD_GV_EFD1100
Affected: GeoVision GV_IPCAMD_GV_FD2410
Affected: GeoVision GV_IPCAMD_GV_FD3400
Affected: GeoVision GV_IPCAMD_GV_FE3401
Affected: GeoVision GV_IPCAMD_GV_FE420
Affected: GeoVision GV-VS14_VS14
Affected: GeoVision GV_VS03
Affected: GeoVision GV_VS2410
Affected: GeoVision GV_VS28XX
Affected: GeoVision GV_VS216XX
Affected: GeoVision GV VS04A
Affected: GeoVision GV VS04H
Affected: GeoVision GVLX 4 V2
Affected: GeoVision GVLX 4 V3
Affected: GeoVision GV_IPCAMD_GV_BX130
Affected: GeoVision GV_GM8186_VS14
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-6047?
CVE-2024-6047 has been scored as a critical severity vulnerability.
How to fix CVE-2024-6047?
To fix CVE-2024-6047: All affected products are no longer in surport. Please retire or replace them.
Is CVE-2024-6047 being actively exploited in the wild?
It is confirmed that CVE-2024-6047 is actively exploited. Be extra cautious if you are using vulnerable components. According to its EPSS score, there is a ~75% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-6047?
CVE-2024-6047 affects GeoVision GV_DSP_LPR_V2, GeoVision GV_IPCAMD_GV_BX1500, GeoVision GV_IPCAMD_GV_CB220, GeoVision GV_IPCAMD_GV_EBL1100, GeoVision GV_IPCAMD_GV_EFD1100, GeoVision GV_IPCAMD_GV_FD2410, GeoVision GV_IPCAMD_GV_FD3400, GeoVision GV_IPCAMD_GV_FE3401, GeoVision GV_IPCAMD_GV_FE420, GeoVision GV-VS14_VS14, GeoVision GV_VS03, GeoVision GV_VS2410, GeoVision GV_VS28XX, GeoVision GV_VS216XX, GeoVision GV VS04A, GeoVision GV VS04H, GeoVision GVLX 4 V2, GeoVision GVLX 4 V3, GeoVision GV_IPCAMD_GV_BX130, GeoVision GV_GM8186_VS14.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.