Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-6047: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in GeoVision GV_DSP_LPR_V2

0
Critical
VulnerabilityCVE-2024-6047cvecve-2024-6047cwe-78
Published: Mon Jun 17 2024 (06/17/2024, 05:48:42 UTC)
Source: CVE
Vendor/Project: GeoVision
Product: GV_DSP_LPR_V2

Description

Certain EOL GeoVision devices fail to properly filter user input for the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:42:54 UTC

Technical Analysis

CVE-2024-6047 is an OS command injection vulnerability classified under CWE-78, affecting all versions of GeoVision's GV_DSP_LPR_V2 product, which is used in license plate recognition and surveillance systems. The vulnerability arises from improper neutralization of special elements in user-supplied input, allowing unauthenticated remote attackers to inject arbitrary OS commands. Because the affected devices are end-of-life (EOL), they likely lack vendor support and patches, increasing exposure. The vulnerability requires no authentication or user interaction, making exploitation straightforward over the network. Successful exploitation can lead to complete system compromise, including unauthorized access, data theft, device manipulation, or denial of service. The CVSS v3.1 score of 9.8 reflects the critical nature of this flaw, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope is unchanged (S:U), but confidentiality, integrity, and availability impacts are all high (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a prime target for attackers, especially in critical infrastructure and surveillance sectors. The lack of available patches necessitates alternative mitigation strategies to reduce risk.

Potential Impact

The impact of CVE-2024-6047 is severe for organizations using GeoVision GV_DSP_LPR_V2 devices, particularly those in security, law enforcement, transportation, and critical infrastructure sectors. Exploitation can lead to full system compromise, allowing attackers to execute arbitrary commands, potentially leading to data breaches, manipulation or disabling of surveillance systems, and disruption of security operations. This can undermine physical security, violate privacy regulations, and cause operational downtime. The vulnerability's unauthenticated remote exploitation capability increases the attack surface, enabling attackers to pivot into broader network environments. Organizations relying on these devices may face reputational damage, regulatory penalties, and financial losses if exploited. The EOL status of the devices complicates remediation, increasing the risk of persistent exploitation and long-term exposure. The vulnerability also poses risks to national security in countries where such devices are widely deployed in public safety and critical infrastructure monitoring.

Mitigation Recommendations

Given the absence of official patches due to the EOL status of the affected GeoVision devices, organizations should implement layered mitigation strategies. First, isolate vulnerable devices on segmented networks with strict access controls to limit exposure. Employ network-level filtering and firewall rules to restrict inbound traffic to only trusted sources. Disable or restrict the vulnerable functionality within GV_DSP_LPR_V2 if possible. Implement robust monitoring and logging to detect anomalous command execution or network activity indicative of exploitation attempts. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect OS command injection patterns. Where feasible, replace EOL devices with supported alternatives that receive security updates. Conduct regular security assessments and penetration testing focused on these devices. Finally, educate security teams about this vulnerability to ensure rapid incident response if exploitation is suspected.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
twcert
Date Reserved
2024-06-17T02:00:24.960Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd89b2

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 2/28/2026, 3:42:54 AM

Last updated: 3/24/2026, 11:18:41 AM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses