A remote code execution vulnerability
exists in Notification Settings on GeoVision GV-ASWeb 6.2.0. An authenticated
user with System Setting permissions can execute arbitrary commands on the
server by sending a crafted HTTP POST request to the ASWebCommon.srf backend
endpoint to bypass the frontend restrictions.

Project Subscriptions

Vendors Products
Geovision Inc. Subscribe
Asmanager Subscribe
Advisories

No advisories yet.

Fixes

Solution

Reported Vulnerability is going to be fixed with the official release of GeoVision's ASMAnager V6.3.0


Workaround

No workaround given by the vendor.

History

Wed, 06 May 2026 07:30:00 +0000

Type Values Removed Values Added
Description A remote code execution vulnerability exists in Notification Settings on GeoVision GV-ASWeb 6.2.0. An authenticated user with System Setting permissions can execute arbitrary commands on the server by sending a crafted HTTP POST request to the ASWebCommon.srf backend endpoint to bypass the frontend restrictions.
Title GV-ASWeb Remote Code Execution (RCE) vulnerability
First Time appeared Geovision Inc.
Geovision Inc. asmanager
Weaknesses CWE-94
CPEs cpe:2.3:a:geovision_inc.:asmanager:v6.2.0:*:windows:*:*:*:*:*
cpe:2.3:a:geovision_inc.:asmanager:v6.3.0:*:windows:*:*:*:*:*
Vendors & Products Geovision Inc.
Geovision Inc. asmanager
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GV

Published:

Updated: 2026-05-06T06:47:53.765Z

Reserved: 2026-05-05T07:36:15.083Z

Link: CVE-2026-7841

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-06T08:16:04.490

Modified: 2026-05-06T08:16:04.490

Link: CVE-2026-7841

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses