'; } else{ echo ''; } echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") { echo ''; echo 'hp-telecom'; } elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") { echo ''; echo 'Maipu'; } elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") { echo ''; echo 'Ncurity'; } elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") { echo ''; echo 'Socusnetwork'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

RULE(RULE ID:339841)

Rule General Information
Release Date: 2026-03-25
Rule Name: GeoVision IoT DateSetting.cgi szSrvIpAddr Command Injection Vulnerability (CVE-2024-6047)
Severity:
CVE ID:
Rule Protection Details
Description: GeoVisionis a Taiwanese manufacturer of security surveillance equipment. Its products include IP cameras, access control controllers, and video servers. The time setting interfaces of several discontinued devices have input validation flaws, allowing unauthorized attackers to remotely execute arbitrary commands. This vulnerability can lead to complete control of the devices.
Impact: An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software.
Affected OS: Windows, Linux, Others
Reference: https://www.akamai.com/blog/security-research/active-exploitation-mirai-geovision-iot-botnet
Solutions
Refer to the announcement or patch by the vendor.