🔐 CVE Alert

CVE-2018-25118

UNKNOWN 0.0

GeoVision Command Injection RCE via /PictureCatch.cgi

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

GeoVision embedded IP devices, confirmed on GV-BX1500 and GV-MFD1501, contain a remote command injection vulnerability via /PictureCatch.cgi that enables an attacker to execute arbitrary commands on the device. The vulnerable models have been declared end-of-life (EOL) by the vendor. VulnCheck has observed this vulnerability being exploited in the wild as of 2025-10-19 08:55:13.141502 UTC.

CWE CWE-78
Vendor geovision inc.
Product gv-bx1500
Published Oct 20, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for geovision inc. gv-bx1500

Be the first to know when new unknown vulnerabilities affecting geovision inc. gv-bx1500 are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

GeoVision Inc. / GV-BX1500
0 < November/December 2017 firmware
GeoVision Inc. / GV-MFD1501
0 < November/December 2017 firmware
GeoVision Inc. / GeoVision embedded IP devices
0 < November/December 2017 firmware

References

NVD ↗ CVE.org ↗ EPSS Data ↗
exploit-db.com: https://www.exploit-db.com/exploits/43982 github.com: https://github.com/mcw0/PoC/blob/fb06efe05b7e240dc88ff31eb30e1ef345509dce/Geovision-PoC.py#L15 vulncheck.com: https://www.vulncheck.com/advisories/geovision-command-injection-rce-picture-catch-cgi geovision.com.tw: https://www.geovision.com.tw/blog/?cat=14 cisa.gov: https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-249a

Credits

bashis