CVE-2026-42368
GeoVision · LPC2011/LPC2211
A privilege escalation vulnerability in the GeoVision LPC2011/LPC2211 web interface allows an attacker to execute privileged operations via a crafted HTTP request.
Executive summary
A critical privilege escalation vulnerability in GeoVision LPC2011/LPC2211 devices allows unauthorized users to perform administrative actions, potentially leading to full device compromise.
Vulnerability
This is a privilege escalation flaw in the web interface. By sending a specially crafted HTTP request, an attacker can bypass standard access controls to execute administrative or privileged functions.
Business impact
With a CVSS score of 9.9, this vulnerability presents a critical risk. If exploited, an attacker could change device settings, disable security features, or gain unauthorized administrative access, compromising the integrity of the surveillance feed and the device itself.
Remediation
Immediate Action: Update the firmware for the GeoVision LPC2011/LPC2211 to the latest version to address the privilege escalation flaw.
Proactive Monitoring: Review access logs for unauthorized administrative requests and monitor for changes to device configurations that were not performed by authorized personnel.
Compensating Controls: Limit access to the device web management interface to internal, trusted networks and implement multi-factor authentication where supported.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Administrators must treat this privilege escalation vulnerability with high urgency. Patching the device firmware is the only reliable way to ensure that administrative functions remain protected from unauthorized access.