CVE-2026-7372
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
04/05/2026
Last modified:
05/05/2026
Description
A stack overflow vulnerability exists in the WebCam Server Login functionality of GeoVision GV-VMS V20 20.0.2. A specially crafted HTTP request can lead to an arbitrary code execution. An attacker can make an unauthenticated HTTP request to trigger this vulnerability.<br />
<br />
#### Stack-overflow via unconstrained sscanf<br />
<br />
The call to `sscanf` at [1] to split the `Buffer` variable into the `username` and `password` variables doesn&#39;t limit the size of the extracted content to match the destination buffers&#39; sizes. In this case, if either the username or password decoded from the authorization string exceeds `40` characters (the size the stack variables `username` and `password`) then a stack overflow will occur. <br />
<br />
<br />
<br />
The data is controlled by an attacker, but sronger constraints (e.g. no null bytes) may make exploitation harder. A successful attack could lead to full code execution as SYSTEM on the machine running the service.
Impact
Base Score 3.x
9.00
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:geovision:gv-vms_firmware:*:*:*:*:*:*:*:* | 21.0.0 (excluding) | |
| cpe:2.3:h:geovision:gv-vms:20:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



