Логотип exploitDog
bind:CVE-2025-47782
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-47782

Количество 2

Количество 2

nvd логотип

CVE-2025-47782

9 месяцев назад

motionEye is an online interface for the software motion, a video surveillance program with motion detection. In versions 0.43.1b1 through 0.43.1b3, using a constructed (camera) device path with the `add`/`add_camera` motionEye web API allows an attacker with motionEye admin user credentials to execute any command within a non-interactive shell as motionEye run user, `motion` by default. The vulnerability has been patched with motionEye v0.43.1b4. As a workaround, apply the patch manually.

EPSS: Низкий
github логотип

GHSA-g5mq-prx7-c588

9 месяцев назад

motionEye vulnerable to RCE in add_camera Function Due to unsafe command execution

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-47782

motionEye is an online interface for the software motion, a video surveillance program with motion detection. In versions 0.43.1b1 through 0.43.1b3, using a constructed (camera) device path with the `add`/`add_camera` motionEye web API allows an attacker with motionEye admin user credentials to execute any command within a non-interactive shell as motionEye run user, `motion` by default. The vulnerability has been patched with motionEye v0.43.1b4. As a workaround, apply the patch manually.

0%
Низкий
9 месяцев назад
github логотип
GHSA-g5mq-prx7-c588

motionEye vulnerable to RCE in add_camera Function Due to unsafe command execution

0%
Низкий
9 месяцев назад

Уязвимостей на страницу