CVE-2026-7841 PUBLISHED

GV-ASWeb Remote Code Execution (RCE) vulnerability

Assigner: GV
Reserved: 05.05.2026 Published: 06.05.2026 Updated: 06.05.2026

A remote code execution vulnerability exists in Notification Settings on GeoVision GV-ASWeb 6.2.0. An authenticated user with System Setting permissions can execute arbitrary commands on the server by sending a crafted HTTP POST request to the ASWebCommon.srf backend endpoint to bypass the frontend restrictions.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS Score: 8.8

Product Status

Vendor GeoVision Inc.
Product ASManager
Versions Default: unaffected
  • Version V6.2.0 is affected
  • Version V6.3.0 is unaffected

Solutions

Reported Vulnerability is going to be fixed with the official release of GeoVision's ASMAnager V6.3.0

Credits

  • Patrick Tung <patricktkc.work@gmail.com> finder

References

Problem Types

  • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE

Impacts

  • CAPEC-242 Code Injection