cve/2024/CVE-2024-6047.md
2025-09-29 16:08:36 +00:00

38 lines
2.5 KiB
Markdown

### [CVE-2024-6047](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6047)
![](https://img.shields.io/static/v1?label=Product&message=GV%20VS04A&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GV%20VS04H&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GV-VS14_VS14&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GVLX%204%20V2&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GVLX%204%20V3&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GV_DSP_LPR_V2&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GV_GM8186_VS14&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GV_IPCAMD_GV_BX130&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GV_IPCAMD_GV_BX1500&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GV_IPCAMD_GV_CB220&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GV_IPCAMD_GV_EBL1100&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GV_IPCAMD_GV_EFD1100&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GV_IPCAMD_GV_FD2410&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GV_IPCAMD_GV_FD3400&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GV_IPCAMD_GV_FE3401&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GV_IPCAMD_GV_FE420&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GV_VS03&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GV_VS216XX&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GV_VS2410&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GV_VS28XX&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20all%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20('OS%20Command%20Injection')&color=brighgreen)
### Description
** UNSUPPPORTED WHEN ASSIGNED ** Certain EOL GeoVision devices fail to properly filter user input for the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/opendr-io/causality
- https://github.com/packetinside/CISA_BOT