GeoVision ASManager Windows Application 6.1.2.0 Remote Code Execution
GeoVision ASManager 6.1.2.0及以下版本存在远程代码执行漏洞,攻击者通过“通知设置”功能可执行任意命令并完全控制服务器。需具备网络访问权限及管理通知设置的账户权限。该漏洞可能导致敏感数据泄露、后门植入及内部网络横向移动等风险。 2025-9-4 21:36:53 Author: cxsecurity.com(查看原文) 阅读量:15 收藏

# Exploit Title: GeoVision ASManager Windows Application 6.1.2.0 - Remote Code Execution (RCE) # Date: 19-MAR-2025 # Exploit Author: Giorgi Dograshvili [DRAGOWN] # Vendor Homepage: https://www.geovision.com.tw/ # Software Link: https://www.geovision.com.tw/download/product/ # Version: 6.1.2.0 or less # Tested on: Windows 10 | Kali Linux # CVE : CVE-2025-26264 # PoC: https://github.com/DRAGOWN/CVE-2025-26264 GeoVision GV-ASWeb with the version 6.1.2.0 or less, contains a Remote Code Execution (RCE) vulnerability within its "Notification Settings" feature. An authenticated attacker with "System Settings" privileges in ASWeb can exploit this flaw to execute arbitrary commands on the server, leading to a full system compromise. Requirements To perform successful attack an attacker requires: - Network access to the GV-ASManager web application with version 6.1.2.0 or less; - Access to an account with privilege of managing Notification Settings feature. Impact The vulnerability can be leveraged to perform the following unauthorized actions: - An account with privilege of managing Notification Settings feature is able to: -- Perform Remote Code Execution attack. - After the successfull attack, an attacker will be able to: -- Access, modify, or delete sensitive system information; -- Plant a system backdoor; -- Perform ransomware attack; -- Perform lateral movement in the internal network. PoC The steps for a successful exploitation are described in the following GitHub article with screenshots: - https://github.com/DRAGOWN/CVE-2025-26264



 

Thanks for you comment!
Your message is in quarantine 48 hours.


文章来源: https://cxsecurity.com/issue/WLB-2025090003
如有侵权请联系:admin#unsafe.sh