GeoVision LPC2011/LPC2211 Web Interface privilege escalation vulnerability
Summary
| CVE | CVE-2026-42368 |
|---|---|
| State | PUBLISHED |
| Assigner | GV |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-04 01:16:04 UTC |
| Updated | 2026-05-04 01:16:04 UTC |
| Description | A privilege escalation vulnerability exists in the Web Interface functionality of GeoVision LPC2011/LPC2211 1.10. A specially crafted HTTP request can lead to execute priviledged operation. An attacker can visit a webpage to trigger this vulnerability. |
Risk And Classification
Primary CVSS: v3.1 9.9 CRITICAL from 0df08a0e-a200-4957-9bb0-084f562506f9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Problem Types: CWE-266 | CWE-266 CWE-266 Incorrect privilege assignment
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | 0df08a0e-a200-4957-9bb0-084f562506f9 | Secondary | 9.9 | CRITICAL | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
| 3.1 | CNA | CVSS | 9.9 | CRITICAL | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
ChangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | GeoVision Inc. | GV-LPC2011/LPC2211 | affected 1.10 | Linux |
| CNA | GeoVision Inc. | GV-LPC2011/LPC2211 | unaffected 1.2 | Linux |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| https/talosintelligence.com/vulnerability_reports | 0df08a0e-a200-4957-9bb0-084f562506f9 | https | |
| www.geovision.com.tw/cyber_security.php | 0df08a0e-a200-4957-9bb0-084f562506f9 | www.geovision.com.tw | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
CNA: Philippe Laulheret of Cisco Talos. (en)
CNA: Kelly Patterson of Cisco Talos. (en)
CNA: Martin Zeiser of Cisco Talos. (en)
Additional Advisory Data
| Source | Time | Event |
|---|---|---|
| CNA | 2026-02-17T01:21:00.000Z | Initial Vendor Contact |
Solutions
CNA: GeoVision GV-LPC2011/LPC2211 V1.12-260330 has patched the reported vulnerability. The user may visit the GeoVision website or contact the GeoVision Support team for firmware update.
There are currently no legacy QID mappings associated with this CVE.