Command Execution Vulnerability in motionEye Surveillance Software
CVE-2025-47782

8.9HIGH

Key Information:

Status
Vendor
CVE Published:
14 May 2025

What is CVE-2025-47782?

The vulnerability in motionEye allows an attacker with admin credentials to exploit the web API. By constructing a malicious camera device path in the add/add_camera API request, the attacker can execute arbitrary commands within a non-interactive shell under the privileges of the motionEye run user (default: motion). This vulnerability exists in versions 0.43.1b1 through 0.43.1b3 and is mitigated in version 0.43.1b4, where a patch is also available for manual application.

Affected Version(s)

motioneye >= 0.43.1b1, < 0.43.1b4

References

CVSS V4

Score:
8.9
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.