Description
A remote code execution vulnerability
exists in Notification Settings on GeoVision GV-ASWeb 6.2.0. An authenticated
user with System Setting permissions can execute arbitrary commands on the
server by sending a crafted HTTP POST request to the ASWebCommon.srf backend
endpoint to bypass the frontend restrictions.
Published: 2026-05-06
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

Vendor Solution

Reported Vulnerability is going to be fixed with the official release of GeoVision's ASMAnager V6.3.0

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 06 May 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Geovision
Geovision gv-asmanager
Vendors & Products Geovision
Geovision gv-asmanager

Wed, 06 May 2026 07:30:00 +0000

Type Values Removed Values Added
Description A remote code execution vulnerability exists in Notification Settings on GeoVision GV-ASWeb 6.2.0. An authenticated user with System Setting permissions can execute arbitrary commands on the server by sending a crafted HTTP POST request to the ASWebCommon.srf backend endpoint to bypass the frontend restrictions.
Title GV-ASWeb Remote Code Execution (RCE) vulnerability
First Time appeared Geovision Inc.
Geovision Inc. asmanager
Weaknesses CWE-94
CPEs cpe:2.3:a:geovision_inc.:asmanager:v6.2.0:*:windows:*:*:*:*:*
cpe:2.3:a:geovision_inc.:asmanager:v6.3.0:*:windows:*:*:*:*:*
Vendors & Products Geovision Inc.
Geovision Inc. asmanager
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Geovision Gv-asmanager
Geovision Inc. Asmanager
cve-icon MITRE

Status: PUBLISHED

Assigner: GV

Published:

Updated: 2026-05-07T01:13:11.587Z

Reserved: 2026-05-05T07:36:15.083Z

Link: CVE-2026-7841

cve-icon Vulnrichment

Updated: 2026-05-06T12:54:45.679Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T08:16:04.490

Modified: 2026-05-07T15:15:06.770

Link: CVE-2026-7841

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T09:30:26Z

Weaknesses