GeoVision LPC2011/LPC2211 Web Interface / ssi.cgi privilege escalation vulnerability via leak of Administrator credentials
Summary
| CVE | CVE-2026-42367 |
|---|---|
| State | PUBLISHED |
| Assigner | GV |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-04 01:16:03 UTC |
| Updated | 2026-05-04 01:16:03 UTC |
| Description | A privilege escalation vulnerability exists in the Web Interface / ssi.cgi functionality of GeoVision LPC2011/LPC2211 1.10. A specially crafted HTTP request can lead to credentials leak. An attacker can visit a webpage to trigger this vulnerability. |
Risk And Classification
Primary CVSS: v3.1 6.5 MEDIUM from 0df08a0e-a200-4957-9bb0-084f562506f9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Problem Types: CWE-522 | CWE-522 CWE-522 - Insufficiently Protected Credentials
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | 0df08a0e-a200-4957-9bb0-084f562506f9 | Secondary | 6.5 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
| 3.1 | CNA | CVSS | 6.5 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
NoneAvailability
NoneCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | GeoVision Inc. | GV-LPC2011/LPC2211 | affected V1.10 | Linux |
| CNA | GeoVision Inc. | GV-LPC2011/LPC2211 | unaffected V1.20 | Linux |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| talosintelligence.com/vulnerability_reports | 0df08a0e-a200-4957-9bb0-084f562506f9 | talosintelligence.com | |
| www.geovision.com.tw/cyber_security.php | 0df08a0e-a200-4957-9bb0-084f562506f9 | www.geovision.com.tw | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
CNA: Philippe Laulheret of Cisco Talos. (en)
CNA: Kelly Patterson of Cisco Talos. (en)
CNA: Martin Zeiser of Cisco Talos. (en)
Additional Advisory Data
| Source | Time | Event |
|---|---|---|
| CNA | 2026-02-17T01:11:00.000Z | Initial Vendor Contact |
Solutions
CNA: GeoVision GV-LPC2011/LPC2211 V1.12-260330 has patched the reported vulnerability. The user may visit the GeoVision website or contact the GeoVision Support team for firmware update.
There are currently no legacy QID mappings associated with this CVE.