CVE-2024-11120: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in GeoVision GV-VS12
Certain EOL GeoVision devices have an OS Command Injection vulnerability. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device. Moreover, this vulnerability has already been exploited by attackers, and we have received related reports.
AI Analysis
Technical Summary
CVE-2024-11120 is an OS Command Injection vulnerability identified in certain end-of-life GeoVision GV-VS12 devices. The root cause is improper neutralization of special elements in operating system commands (CWE-78), which allows unauthenticated remote attackers to inject and execute arbitrary system commands on the affected device. This vulnerability does not require any authentication or user interaction, making it highly exploitable over the network. The CVSS v3.1 base score is 9.8, indicating critical severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The vulnerability affects the confidentiality, integrity, and availability of the device, potentially allowing attackers to take full control, disrupt services, or pivot into internal networks. Although the devices are end-of-life and no patches have been released, reports indicate that exploitation attempts have been observed in the wild. The affected product, GeoVision GV-VS12, is typically used in video surveillance and security monitoring, making the impact significant for organizations relying on these systems for physical security. The lack of patches and the critical nature of the flaw necessitate immediate mitigation steps to prevent compromise.
Potential Impact
For European organizations, the exploitation of CVE-2024-11120 could lead to severe consequences including unauthorized access to surveillance systems, manipulation or deletion of video feeds, disruption of security monitoring, and potential lateral movement into corporate networks. This could compromise physical security, expose sensitive video data, and disrupt operational continuity. Organizations in sectors such as critical infrastructure, government, transportation, and large enterprises that rely on GeoVision GV-VS12 devices for surveillance are particularly vulnerable. The critical severity and ease of exploitation increase the risk of widespread attacks, potentially leading to data breaches, espionage, or sabotage. The unavailability of patches exacerbates the risk, forcing organizations to rely on compensating controls. The impact extends beyond the device itself, as compromised surveillance systems can serve as entry points for broader network intrusions.
Mitigation Recommendations
Given the absence of official patches, European organizations should immediately implement network segmentation to isolate GeoVision GV-VS12 devices from critical networks and sensitive data. Disable all remote access interfaces to these devices, especially those exposed to the internet. Employ strict firewall rules to restrict inbound and outbound traffic to only trusted sources. Monitor network traffic for unusual command execution patterns or unexpected connections originating from these devices. Consider replacing end-of-life GV-VS12 devices with supported, patched alternatives as a long-term solution. If replacement is not immediately feasible, deploy intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting OS command injection patterns. Maintain up-to-date asset inventories to identify all affected devices. Conduct regular security audits and penetration tests focusing on surveillance infrastructure. Finally, educate security teams about this vulnerability to ensure rapid incident response if exploitation is detected.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2024-11120: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in GeoVision GV-VS12
Description
Certain EOL GeoVision devices have an OS Command Injection vulnerability. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device. Moreover, this vulnerability has already been exploited by attackers, and we have received related reports.
AI-Powered Analysis
Technical Analysis
CVE-2024-11120 is an OS Command Injection vulnerability identified in certain end-of-life GeoVision GV-VS12 devices. The root cause is improper neutralization of special elements in operating system commands (CWE-78), which allows unauthenticated remote attackers to inject and execute arbitrary system commands on the affected device. This vulnerability does not require any authentication or user interaction, making it highly exploitable over the network. The CVSS v3.1 base score is 9.8, indicating critical severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The vulnerability affects the confidentiality, integrity, and availability of the device, potentially allowing attackers to take full control, disrupt services, or pivot into internal networks. Although the devices are end-of-life and no patches have been released, reports indicate that exploitation attempts have been observed in the wild. The affected product, GeoVision GV-VS12, is typically used in video surveillance and security monitoring, making the impact significant for organizations relying on these systems for physical security. The lack of patches and the critical nature of the flaw necessitate immediate mitigation steps to prevent compromise.
Potential Impact
For European organizations, the exploitation of CVE-2024-11120 could lead to severe consequences including unauthorized access to surveillance systems, manipulation or deletion of video feeds, disruption of security monitoring, and potential lateral movement into corporate networks. This could compromise physical security, expose sensitive video data, and disrupt operational continuity. Organizations in sectors such as critical infrastructure, government, transportation, and large enterprises that rely on GeoVision GV-VS12 devices for surveillance are particularly vulnerable. The critical severity and ease of exploitation increase the risk of widespread attacks, potentially leading to data breaches, espionage, or sabotage. The unavailability of patches exacerbates the risk, forcing organizations to rely on compensating controls. The impact extends beyond the device itself, as compromised surveillance systems can serve as entry points for broader network intrusions.
Mitigation Recommendations
Given the absence of official patches, European organizations should immediately implement network segmentation to isolate GeoVision GV-VS12 devices from critical networks and sensitive data. Disable all remote access interfaces to these devices, especially those exposed to the internet. Employ strict firewall rules to restrict inbound and outbound traffic to only trusted sources. Monitor network traffic for unusual command execution patterns or unexpected connections originating from these devices. Consider replacing end-of-life GV-VS12 devices with supported, patched alternatives as a long-term solution. If replacement is not immediately feasible, deploy intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting OS command injection patterns. Maintain up-to-date asset inventories to identify all affected devices. Conduct regular security audits and penetration tests focusing on surveillance infrastructure. Finally, educate security teams about this vulnerability to ensure rapid incident response if exploitation is detected.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- twcert
- Date Reserved
- 2024-11-12T06:23:33.571Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9819c4522896dcbd89ac
Added to database: 5/21/2025, 9:08:41 AM
Last enriched: 10/21/2025, 7:52:04 PM
Last updated: 12/4/2025, 8:35:30 AM
Views: 31
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12826: CWE-862 Missing Authorization in webdevstudios Custom Post Type UI
MediumCVE-2025-12782: CWE-862 Missing Authorization in beaverbuilder Beaver Builder Page Builder – Drag and Drop Website Builder
MediumCVE-2025-13513: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codejunkie Clik stats
MediumCVE-2025-11727: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codisto Omnichannel for WooCommerce: Google, Amazon, eBay & Walmart Integration – Powered by Codisto
HighCVE-2025-11379: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in roselldk WebP Express
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.