CVE-2024-6047: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in GeoVision GV_DSP_LPR_V2
Certain EOL GeoVision devices fail to properly filter user input for the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device.
AI Analysis
Technical Summary
CVE-2024-6047 is a critical vulnerability classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), affecting all versions of the GeoVision GV_DSP_LPR_V2 product, which is an end-of-life (EOL) device used primarily for license plate recognition. The vulnerability arises because the device fails to properly sanitize or filter user-supplied input in a specific functionality, allowing unauthenticated remote attackers to inject arbitrary operating system commands. This flaw enables attackers to execute commands with the privileges of the vulnerable device, potentially leading to full system compromise. The CVSS v3.1 base score is 9.8, reflecting the vulnerability's ease of exploitation (no authentication or user interaction required), and its severe impact on confidentiality, integrity, and availability. The vulnerability is publicly disclosed but currently has no known exploits in the wild. Given the device's EOL status, no official patches are available, increasing the risk for organizations still operating these devices. The vulnerability could be exploited remotely over the network, making it a significant threat vector for attackers aiming to gain unauthorized control over security infrastructure components.
Potential Impact
For European organizations, the impact of CVE-2024-6047 is substantial. GeoVision GV_DSP_LPR_V2 devices are typically deployed in security-sensitive environments such as parking management, law enforcement, and critical infrastructure surveillance. Successful exploitation could lead to unauthorized access to sensitive data, manipulation or disabling of security monitoring functions, and lateral movement within the network. This could result in breaches of personal data protected under GDPR, operational disruptions, and potential physical security risks. The lack of authentication and the ability to execute arbitrary commands remotely amplify the threat, potentially allowing attackers to install malware, exfiltrate data, or disrupt services. The EOL status of the product means no vendor support or patches are forthcoming, forcing organizations to rely on compensating controls. The threat is particularly acute for organizations with direct internet exposure of these devices or insufficient network segmentation, increasing the likelihood of exploitation and subsequent damage.
Mitigation Recommendations
Given the absence of official patches due to the product's EOL status, European organizations should implement immediate compensating controls. First, isolate GV_DSP_LPR_V2 devices from public networks by placing them behind firewalls and restricting access to trusted management networks only. Employ strict network segmentation to limit lateral movement if a device is compromised. Disable any unnecessary services or functionalities on the device to reduce the attack surface. Monitor network traffic for unusual command execution patterns or unauthorized access attempts targeting these devices. Where feasible, replace the affected devices with supported, patched alternatives to eliminate the vulnerability entirely. Additionally, implement strong logging and alerting mechanisms to detect exploitation attempts early. Conduct regular security audits and vulnerability assessments focusing on legacy devices. Finally, educate security teams about this specific threat to ensure rapid response if exploitation indicators are observed.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Belgium, Poland
CVE-2024-6047: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in GeoVision GV_DSP_LPR_V2
Description
Certain EOL GeoVision devices fail to properly filter user input for the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device.
AI-Powered Analysis
Technical Analysis
CVE-2024-6047 is a critical vulnerability classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), affecting all versions of the GeoVision GV_DSP_LPR_V2 product, which is an end-of-life (EOL) device used primarily for license plate recognition. The vulnerability arises because the device fails to properly sanitize or filter user-supplied input in a specific functionality, allowing unauthenticated remote attackers to inject arbitrary operating system commands. This flaw enables attackers to execute commands with the privileges of the vulnerable device, potentially leading to full system compromise. The CVSS v3.1 base score is 9.8, reflecting the vulnerability's ease of exploitation (no authentication or user interaction required), and its severe impact on confidentiality, integrity, and availability. The vulnerability is publicly disclosed but currently has no known exploits in the wild. Given the device's EOL status, no official patches are available, increasing the risk for organizations still operating these devices. The vulnerability could be exploited remotely over the network, making it a significant threat vector for attackers aiming to gain unauthorized control over security infrastructure components.
Potential Impact
For European organizations, the impact of CVE-2024-6047 is substantial. GeoVision GV_DSP_LPR_V2 devices are typically deployed in security-sensitive environments such as parking management, law enforcement, and critical infrastructure surveillance. Successful exploitation could lead to unauthorized access to sensitive data, manipulation or disabling of security monitoring functions, and lateral movement within the network. This could result in breaches of personal data protected under GDPR, operational disruptions, and potential physical security risks. The lack of authentication and the ability to execute arbitrary commands remotely amplify the threat, potentially allowing attackers to install malware, exfiltrate data, or disrupt services. The EOL status of the product means no vendor support or patches are forthcoming, forcing organizations to rely on compensating controls. The threat is particularly acute for organizations with direct internet exposure of these devices or insufficient network segmentation, increasing the likelihood of exploitation and subsequent damage.
Mitigation Recommendations
Given the absence of official patches due to the product's EOL status, European organizations should implement immediate compensating controls. First, isolate GV_DSP_LPR_V2 devices from public networks by placing them behind firewalls and restricting access to trusted management networks only. Employ strict network segmentation to limit lateral movement if a device is compromised. Disable any unnecessary services or functionalities on the device to reduce the attack surface. Monitor network traffic for unusual command execution patterns or unauthorized access attempts targeting these devices. Where feasible, replace the affected devices with supported, patched alternatives to eliminate the vulnerability entirely. Additionally, implement strong logging and alerting mechanisms to detect exploitation attempts early. Conduct regular security audits and vulnerability assessments focusing on legacy devices. Finally, educate security teams about this specific threat to ensure rapid response if exploitation indicators are observed.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- twcert
- Date Reserved
- 2024-06-17T02:00:24.960Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9819c4522896dcbd89b2
Added to database: 5/21/2025, 9:08:41 AM
Last enriched: 10/21/2025, 9:12:18 PM
Last updated: 11/30/2025, 2:33:35 PM
Views: 41
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13789: Server-Side Request Forgery in ZenTao
MediumCVE-2025-13788: SQL Injection in Chanjet CRM
MediumCVE-2025-13787: Improper Privilege Management in ZenTao
MediumCVE-2025-13786: Code Injection in taosir WTCMS
MediumCVE-2025-13785: Information Disclosure in yungifez Skuul School Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.