CVE-2026-7371
Published: 04 May 2026
Description
Multiple reflected cross-site scripting (xss) vulnerabilities exist in the Web Interface / ssi.cgi functionality of GeoVision LPC2011/LPC2211 1.10. A specially crafted malicious url can lead to an arbitrary javascript code execution. An attacker can provide a crafted URL to trigger…
more
this vulnerability. Reflected XXS via the error message for requesting non-existing page.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates reflected XSS in error messages by requiring generic error responses that do not disclose system state or reflect untrusted input.
Prevents arbitrary JavaScript execution from crafted URLs by filtering outputs in the web interface, including error pages.
Validates inputs from malicious URLs to the ssi.cgi functionality, blocking payloads that could lead to XSS execution.
Security SummaryAI
CVE-2026-7371 describes multiple reflected cross-site scripting (XSS) vulnerabilities in the Web Interface / ssi.cgi functionality of GeoVision LPC2011/LPC2211 version 1.10. These flaws allow a specially crafted malicious URL to trigger arbitrary JavaScript code execution within a victim's browser. The issue specifically arises from reflected XSS in the error message displayed when requesting a non-existing page.
An unauthenticated attacker with network access can exploit this vulnerability by providing a crafted URL to a target user, requiring user interaction such as clicking a link or visiting the malicious page (UI:R). Successful exploitation leads to JavaScript execution in the context of the web interface (S:C), resulting in high confidentiality impact (C:H) by potentially stealing sensitive data like session cookies or credentials, with no impact on integrity or availability (I:N/A:N). The vulnerability has a CVSS v3.1 base score of 7.4 (AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N) and is associated with CWE-79.
Mitigation details are available in advisories from Talos Intelligence (https://talosintelligence.com/vulnerability_reports/) and GeoVision's cyber security page (https://www.geovision.com.tw/cyber_security.php). Security practitioners should consult these resources for patch information or workarounds specific to the affected GeoVision devices.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Reflected XSS in public-facing web interface directly enables T1190 exploitation; triggers arbitrary JS execution (T1059.007); facilitates session cookie theft (T1539); crafted malicious URLs are typically delivered via spearphishing links (T1566.002).