Exploited
CWE
78 77
Advisory Published
Updated

CVE-2024-11120: GeoVision EOL devices - OS Command Injection

First published: Fri Nov 15 2024(Updated: )

Certain EOL GeoVision devices have an OS Command Injection vulnerability. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device. Moreover, this vulnerability has already been exploited by attackers, and we have received related reports.

Credit: twcert@cert.org.tw

Affected SoftwareAffected VersionHow to fix
All of
Geovision Gv-vs12 Firmware
Geovision Gv-vs12 Firmware
All of
Geovision Gv-vs11 Firmware
Geovision Gv-vs11 Firmware
All of
Geovision Gv-dsp Lpr Firmware
Geovision Gv-dsp Lpr Firmware=3.0
All of
Geovision GVLX 4
Geovision GVLX 4 Firmware=2.0
All of
Geovision GVLX 4
Geovision GVLX 4 Firmware=3.0
GeoVision Multiple Devices

Remedy

The affected devices are no longer being maintained. It is recommended to replace them.

Remedy

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-11120?

    CVE-2024-11120 is classified as a high severity vulnerability due to its potential for unauthenticated remote command execution.

  • How do I fix CVE-2024-11120?

    To fix CVE-2024-11120, update affected GeoVision devices to the latest firmware version provided by the manufacturer.

  • What types of devices are affected by CVE-2024-11120?

    CVE-2024-11120 affects certain EOL (end-of-life) GeoVision devices, including models GV-VS11, GV-VS12, and GV-DSP LPR.

  • Can CVE-2024-11120 be exploited remotely?

    Yes, CVE-2024-11120 can be exploited remotely by unauthenticated attackers to execute arbitrary system commands.

  • Has CVE-2024-11120 been actively exploited in the wild?

    Yes, CVE-2024-11120 has been reported to have already been exploited by attackers to install malware.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203