CVE-2018-25118
GeoVision Command Injection RCE via /PictureCatch.cgi
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
GeoVision embedded IP devices, confirmed on GV-BX1500 and GV-MFD1501, contain a remote command injection vulnerability via /PictureCatch.cgi that enables an attacker to execute arbitrary commands on the device. The vulnerable models have been declared end-of-life (EOL) by the vendor. VulnCheck has observed this vulnerability being exploited in the wild as of 2025-10-19 08:55:13.141502 UTC.
| CWE | CWE-78 |
| Vendor | geovision inc. |
| Product | gv-bx1500 |
| Published | Oct 20, 2025 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for geovision inc. gv-bx1500
Be the first to know when new unknown vulnerabilities affecting geovision inc. gv-bx1500 are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
Affected Versions
GeoVision Inc. / GV-BX1500
0 < November/December 2017 firmware
GeoVision Inc. / GV-MFD1501
0 < November/December 2017 firmware
GeoVision Inc. / GeoVision embedded IP devices
0 < November/December 2017 firmware
References
exploit-db.com: https://www.exploit-db.com/exploits/43982 github.com: https://github.com/mcw0/PoC/blob/fb06efe05b7e240dc88ff31eb30e1ef345509dce/Geovision-PoC.py#L15 vulncheck.com: https://www.vulncheck.com/advisories/geovision-command-injection-rce-picture-catch-cgi geovision.com.tw: https://www.geovision.com.tw/blog/?cat=14 cisa.gov: https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-249a
Credits
bashis