Command Execution Vulnerability in motionEye Surveillance Software
CVE-2025-47782
8.9HIGH
What is CVE-2025-47782?
The vulnerability in motionEye allows an attacker with admin credentials to exploit the web API. By constructing a malicious camera device path in the add/add_camera API request, the attacker can execute arbitrary commands within a non-interactive shell under the privileges of the motionEye run user (default: motion). This vulnerability exists in versions 0.43.1b1 through 0.43.1b3 and is mitigated in version 0.43.1b4, where a patch is also available for manual application.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
motioneye >= 0.43.1b1, < 0.43.1b4
References
CVSS V4
Score:
8.9
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved
