Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-6047: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in GeoVision GV_DSP_LPR_V2

0
Critical
VulnerabilityCVE-2024-6047cvecve-2024-6047cwe-78
Published: Mon Jun 17 2024 (06/17/2024, 05:48:42 UTC)
Source: CVE
Vendor/Project: GeoVision
Product: GV_DSP_LPR_V2

Description

Certain EOL GeoVision devices fail to properly filter user input for the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device.

AI-Powered Analysis

AILast updated: 10/21/2025, 21:12:18 UTC

Technical Analysis

CVE-2024-6047 is a critical vulnerability classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), affecting all versions of the GeoVision GV_DSP_LPR_V2 product, which is an end-of-life (EOL) device used primarily for license plate recognition. The vulnerability arises because the device fails to properly sanitize or filter user-supplied input in a specific functionality, allowing unauthenticated remote attackers to inject arbitrary operating system commands. This flaw enables attackers to execute commands with the privileges of the vulnerable device, potentially leading to full system compromise. The CVSS v3.1 base score is 9.8, reflecting the vulnerability's ease of exploitation (no authentication or user interaction required), and its severe impact on confidentiality, integrity, and availability. The vulnerability is publicly disclosed but currently has no known exploits in the wild. Given the device's EOL status, no official patches are available, increasing the risk for organizations still operating these devices. The vulnerability could be exploited remotely over the network, making it a significant threat vector for attackers aiming to gain unauthorized control over security infrastructure components.

Potential Impact

For European organizations, the impact of CVE-2024-6047 is substantial. GeoVision GV_DSP_LPR_V2 devices are typically deployed in security-sensitive environments such as parking management, law enforcement, and critical infrastructure surveillance. Successful exploitation could lead to unauthorized access to sensitive data, manipulation or disabling of security monitoring functions, and lateral movement within the network. This could result in breaches of personal data protected under GDPR, operational disruptions, and potential physical security risks. The lack of authentication and the ability to execute arbitrary commands remotely amplify the threat, potentially allowing attackers to install malware, exfiltrate data, or disrupt services. The EOL status of the product means no vendor support or patches are forthcoming, forcing organizations to rely on compensating controls. The threat is particularly acute for organizations with direct internet exposure of these devices or insufficient network segmentation, increasing the likelihood of exploitation and subsequent damage.

Mitigation Recommendations

Given the absence of official patches due to the product's EOL status, European organizations should implement immediate compensating controls. First, isolate GV_DSP_LPR_V2 devices from public networks by placing them behind firewalls and restricting access to trusted management networks only. Employ strict network segmentation to limit lateral movement if a device is compromised. Disable any unnecessary services or functionalities on the device to reduce the attack surface. Monitor network traffic for unusual command execution patterns or unauthorized access attempts targeting these devices. Where feasible, replace the affected devices with supported, patched alternatives to eliminate the vulnerability entirely. Additionally, implement strong logging and alerting mechanisms to detect exploitation attempts early. Conduct regular security audits and vulnerability assessments focusing on legacy devices. Finally, educate security teams about this specific threat to ensure rapid response if exploitation indicators are observed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
twcert
Date Reserved
2024-06-17T02:00:24.960Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd89b2

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 10/21/2025, 9:12:18 PM

Last updated: 11/30/2025, 2:33:35 PM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats