#### Stack-overflow via unconstrained sscanf
The call to `sscanf` at [1] to split the `Buffer` variable into the `username` and `password` variables doesn't limit the size of the extracted content to match the destination buffers' sizes. In this case, if either the username or password decoded from the authorization string exceeds `40` characters (the size the stack variables `username` and `password`) then a stack overflow will occur.
The data is controlled by an attacker, but sronger constraints (e.g. no null bytes) may make exploitation harder. A successful attack could lead to full code execution as SYSTEM on the machine running the service.
No advisories yet.
Solution
GeoVision GV-VMS version V21.0.0 has patched the reported vulnerability. User is recommended to download the update from GeoVision's offical website (https://www.geovision.com.tw/download/product/GV-VMS%20V20) or contact GeoVision Support team
Workaround
No workaround given by the vendor.
Mon, 04 May 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A stack overflow vulnerability exists in the WebCam Server Login functionality of GeoVision GV-VMS V20 20.0.2. A specially crafted HTTP request can lead to an arbitrary code execution. An attacker can make an unauthenticated HTTP request to trigger this vulnerability. #### Stack-overflow via unconstrained sscanf The call to `sscanf` at [1] to split the `Buffer` variable into the `username` and `password` variables doesn't limit the size of the extracted content to match the destination buffers' sizes. In this case, if either the username or password decoded from the authorization string exceeds `40` characters (the size the stack variables `username` and `password`) then a stack overflow will occur. The data is controlled by an attacker, but sronger constraints (e.g. no null bytes) may make exploitation harder. A successful attack could lead to full code execution as SYSTEM on the machine running the service. | |
| Title | GeoVision GV-VMS V20 WebCam Server Login stack overflow vulnerability | |
| First Time appeared |
Geovision Inc.
Geovision Inc. gv-vms V20.0.2 |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:geovision_inc.:gv-vms_v20.0.2:20.0.2:*:windows:*:*:*:*:* cpe:2.3:a:geovision_inc.:gv-vms_v20.0.2:21.0.0:*:windows:*:*:*:*:* |
|
| Vendors & Products |
Geovision Inc.
Geovision Inc. gv-vms V20.0.2 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GV
Published:
Updated: 2026-05-04T00:47:36.651Z
Reserved: 2026-04-28T23:12:55.269Z
Link: CVE-2026-7372
No data.
Status : Received
Published: 2026-05-04T01:16:04.730
Modified: 2026-05-04T01:16:04.730
Link: CVE-2026-7372
No data.
OpenCVE Enrichment
No data.