GeoVision ASManager Windows Application 6.1.2.0 – Remote Code Execution (RCE)


# Exploit Title: GeoVision ASManager Windows Application 6.1.2.0 - Remote Code Execution (RCE)
# Date: 19-MAR-2025
# Exploit Author: Giorgi Dograshvili [DRAGOWN]
# Vendor Homepage: https://www.geovision.com.tw/
# Software Link: https://www.geovision.com.tw/download/product/
# Version: 6.1.2.0 or less
# Tested on: Windows 10 | Kali Linux
# CVE : CVE-2025-26264
# PoC: https://github.com/DRAGOWN/CVE-2025-26264

GeoVision GV-ASWeb with the version 6.1.2.0 or less, contains a Remote Code Execution (RCE) vulnerability within its "Notification Settings" feature. An authenticated attacker with "System Settings" privileges in ASWeb can exploit this flaw to execute arbitrary commands on the server, leading to a full system compromise.

Requirements
To perform successful attack an attacker requires:
- Network access to the GV-ASManager web application with version 6.1.2.0 or less;
- Access to an account with privilege of managing Notification Settings feature.

Impact
The vulnerability can be leveraged to perform the following unauthorized actions:
- An account with privilege of managing Notification Settings feature is able to:
-- Perform Remote Code Execution attack.
- After the successfull attack, an attacker will be able to:
-- Access, modify, or delete sensitive system information;
-- Plant a system backdoor;
-- Perform ransomware attack;
-- Perform lateral movement in the internal network.

PoC
The steps for a successful exploitation are described in the following GitHub article with screenshots:
- https://github.com/DRAGOWN/CVE-2025-26264
            



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *