Vulnerability Description
GeoVision embedded IP devices, confirmed on GV-BX1500 and GV-MFD1501, contain a remote command injection vulnerability via /PictureCatch.cgi that enables an attacker to execute arbitrary commands on the device. The vulnerable models have been declared end-of-life (EOL) by the vendor. VulnCheck has observed this vulnerability being exploited in the wild as of 2025-10-19 08:55:13.141502 UTC.
Related Weaknesses (CWE)
References
- https://github.com/mcw0/PoC/blob/fb06efe05b7e240dc88ff31eb30e1ef345509dce/Geovis
- https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-249a
- https://www.exploit-db.com/exploits/43982
- https://www.geovision.com.tw/blog/?cat=14
- https://www.vulncheck.com/advisories/geovision-command-injection-rce-picture-cat
- https://github.com/mcw0/PoC/blob/fb06efe05b7e240dc88ff31eb30e1ef345509dce/Geovis
- https://www.exploit-db.com/exploits/43982
- https://www.vulncheck.com/advisories/geovision-command-injection-rce-picture-cat
FAQ
What is CVE-2018-25118?
CVE-2018-25118 is a documented vulnerability. GeoVision embedded IP devices, confirmed on GV-BX1500 and GV-MFD1501, contain a remote command injection vulnerability via /PictureCatch.cgi that enables an attacker to execute arbitrary commands on t...
How severe is CVE-2018-25118?
CVSS scoring is not yet available for CVE-2018-25118. Check NVD for updates.
Is there a patch for CVE-2018-25118?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.