First published: Thu Feb 27 2025(Updated: )
GeoVision GV-ASWeb with the version 6.1.2.0 or less (fixed in 6.2.0), contains a Remote Code Execution (RCE) vulnerability within its Notification Settings feature. An authenticated attacker with "System Settings" privileges in ASWeb can exploit this flaw to execute arbitrary commands on the server, leading to a full system compromise.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GeoVision | <=6.1.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-26264 is rated as a critical vulnerability due to its potential for remote code execution.
To mitigate CVE-2025-26264, upgrade GeoVision GV-ASWeb to a version later than 6.1.2.0.
Any user of GeoVision GV-ASWeb versions 6.1.2.0 and earlier that grants "System Settings" privileges is potentially affected by CVE-2025-26264.
CVE-2025-26264 is classified as a Remote Code Execution (RCE) vulnerability.
Yes, CVE-2025-26264 can be exploited remotely by an authenticated attacker with appropriate privileges.