cve/2024/CVE-2024-6047.md

38 lines
2.5 KiB
Markdown
Raw Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-6047](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6047)
![](https://img.shields.io/static/v1?label=Product&message=GV%20VS04A&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GV%20VS04H&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GV-VS14_VS14&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GVLX%204%20V2&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GVLX%204%20V3&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GV_DSP_LPR_V2&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GV_GM8186_VS14&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GV_IPCAMD_GV_BX130&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GV_IPCAMD_GV_BX1500&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GV_IPCAMD_GV_CB220&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GV_IPCAMD_GV_EBL1100&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GV_IPCAMD_GV_EFD1100&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GV_IPCAMD_GV_FD2410&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GV_IPCAMD_GV_FD3400&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GV_IPCAMD_GV_FE3401&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GV_IPCAMD_GV_FE420&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GV_VS03&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GV_VS216XX&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GV_VS2410&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GV_VS28XX&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20all%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20('OS%20Command%20Injection')&color=brighgreen)
### Description
** UNSUPPPORTED WHEN ASSIGNED ** Certain EOL GeoVision devices fail to properly filter user input for the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/opendr-io/causality
- https://github.com/packetinside/CISA_BOT