motionEye is an online interface for the software motion, a video surveillance program with motion detection. In versions 0.43.1b1 through 0.43.1b3, using a constructed (camera) device path with the `add`/`add_camera` motionEye web API allows an attacker with motionEye admin user credentials to execute any command within a non-interactive shell as motionEye run user, `motion` by default. The vulnerability has been patched with motionEye v0.43.1b4. As a workaround, apply the patch manually.
Metrics
Affected Vendors & Products
References
History
Wed, 14 May 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 14 May 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | motionEye is an online interface for the software motion, a video surveillance program with motion detection. In versions 0.43.1b1 through 0.43.1b3, using a constructed (camera) device path with the `add`/`add_camera` motionEye web API allows an attacker with motionEye admin user credentials to execute any command within a non-interactive shell as motionEye run user, `motion` by default. The vulnerability has been patched with motionEye v0.43.1b4. As a workaround, apply the patch manually. | |
Title | motionEye vulnerable to RCE in add_camera Function Due to unsafe command execution | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-05-14T15:54:59.309Z
Updated: 2025-05-14T17:36:32.512Z
Reserved: 2025-05-09T19:49:35.620Z
Link: CVE-2025-47782

Updated: 2025-05-14T17:36:21.073Z

Status : Received
Published: 2025-05-14T16:15:29.580
Modified: 2025-05-14T18:15:31.657
Link: CVE-2025-47782

No data.