CVE-2026-42364
GeoVision · LPC2011/LPC2211
An OS command injection vulnerability in the DdnsSetting.cgi functionality of GeoVision LPC2011/LPC2211 allows arbitrary command execution via crafted DDNS configuration.
Executive summary
A critical OS command injection vulnerability in GeoVision LPC2011/LPC2211 devices allows unauthenticated attackers to execute arbitrary commands, potentially leading to full system compromise.
Vulnerability
This vulnerability is an OS command injection flaw located within the DdnsSetting.cgi script. By providing a specially crafted DDNS configuration value, an attacker can bypass input validation to execute system-level commands.
Business impact
Successful exploitation of this vulnerability grants the attacker the ability to execute arbitrary commands on the affected hardware, which can result in full system takeover, data exfiltration, or the inclusion of the device into a botnet. Given the CVSS score of 9.9, this represents an extreme risk to network integrity and operational continuity, as compromised surveillance equipment can serve as an entry point into the wider corporate network.
Remediation
Immediate Action: Upgrade the GeoVision LPC2011/LPC2211 firmware to the latest version provided by the vendor to patch the injection vector.
Proactive Monitoring: Inspect system and web access logs for unusual requests directed at DdnsSetting.cgi or unexpected shell execution commands.
Compensating Controls: Implement strict network segmentation for IoT and surveillance devices and utilize a Web Application Firewall (WAF) to filter malicious input strings from configuration requests.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The severity of this vulnerability necessitates immediate attention. Organizations utilizing these GeoVision devices must prioritize firmware updates to close the command injection vector and prevent unauthorized remote code execution.