CVE-2026-7372
Published: 04 May 2026
Description
A stack overflow vulnerability exists in the WebCam Server Login functionality of GeoVision GV-VMS V20 20.0.2. A specially crafted HTTP request can lead to an arbitrary code execution. An attacker can make an unauthenticated HTTP request to trigger this vulnerability.…
more
#### Stack-overflow via unconstrained sscanf The call to `sscanf` at [1] to split the `Buffer` variable into the `username` and `password` variables doesn't limit the size of the extracted content to match the destination buffers' sizes. In this case, if either the username or password decoded from the authorization string exceeds `40` characters (the size the stack variables `username` and `password`) then a stack overflow will occur. The data is controlled by an attacker, but sronger constraints (e.g. no null bytes) may make exploitation harder. A successful attack could lead to full code execution as SYSTEM on the machine running the service.
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation of HTTP authorization string inputs to limit username and password lengths to 40 characters, preventing the unconstrained sscanf from causing stack overflow.
Implements runtime memory protections like stack canaries, ASLR, and DEP to block exploitation of the stack buffer overflow even if input validation fails.
Mandates identification, prioritization, and remediation of the specific stack overflow flaw in GeoVision GV-VMS via patching or upgrades to eliminate the vulnerability.
Security SummaryAI
CVE-2026-7372 is a stack overflow vulnerability in the WebCam Server Login functionality of GeoVision GV-VMS V20 version 20.0.2. The issue stems from an unconstrained call to sscanf that parses the Buffer variable into username and password stack variables without limiting the extracted content to the 40-character size of those buffers. A specially crafted HTTP request can trigger the overflow, enabling arbitrary code execution, and is classified under CWE-787 with a CVSS v3.1 score of 9.0 (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).
An unauthenticated remote attacker can exploit this vulnerability by sending a malicious HTTP request containing an overly long username or password in the authorization string, exceeding the 40-character buffer limits and causing a stack overflow. While attacker-controlled data enables the overflow, exploitation may be complicated by constraints such as the absence of null bytes. Successful exploitation leads to full arbitrary code execution with SYSTEM privileges on the host running the service.
For mitigation details, refer to advisories from Talos Intelligence at https://talosintelligence.com/vulnerability_reports/ and GeoVision's cyber security page at https://www.geovision.com.tw/cyber_security.php.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Stack overflow in unauthenticated WebCam Server Login (HTTP) directly enables remote exploitation of a public-facing application for arbitrary code execution as SYSTEM.