Логотип exploitDog
bind: "CVE-2025-60787"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2025-60787"

Количество 2

Количество 2

nvd логотип

CVE-2025-60787

30 дней назад

MotionEye v0.43.1b4 and before is vulnerable to OS Command Injection in configuration parameters such as image_file_name. Unsanitized user input is written to Motion configuration files, allowing remote authenticated attackers with admin access to achieve code execution when Motion is restarted.

CVSS3: 7.2
EPSS: Средний
github логотип

GHSA-26f6-wm47-7h7j

30 дней назад

MotionEye v0.43.1b4 and before is vulnerable to OS Command Injection in configuration parameters such as image_file_name. Unsanitized user input is written to Motion configuration files, allowing remote authenticated attackers with admin access to achieve code execution when Motion is restarted.

CVSS3: 7.2
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-60787

MotionEye v0.43.1b4 and before is vulnerable to OS Command Injection in configuration parameters such as image_file_name. Unsanitized user input is written to Motion configuration files, allowing remote authenticated attackers with admin access to achieve code execution when Motion is restarted.

CVSS3: 7.2
23%
Средний
30 дней назад
github логотип
GHSA-26f6-wm47-7h7j

MotionEye v0.43.1b4 and before is vulnerable to OS Command Injection in configuration parameters such as image_file_name. Unsanitized user input is written to Motion configuration files, allowing remote authenticated attackers with admin access to achieve code execution when Motion is restarted.

CVSS3: 7.2
23%
Средний
30 дней назад

Уязвимостей на страницу