Description
Authenticated remote code execution in MotionEye <= 0.42.1 and MotioneEyeOS <= 20200606 allows a remote attacker to upload a configuration backup file containing a malicious python pickle file which will execute arbitrary code on the server.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-m2c7-42rf-c62f | Unrestricted Upload of File with Dangerous Type in motionEye |
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T04:17:25.071Z
Reserved: 2021-11-29T00:00:00.000Z
Link: CVE-2021-44255
No data.
Status : Modified
Published: 2022-01-31T12:15:07.767
Modified: 2024-11-21T06:30:40.450
Link: CVE-2021-44255
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA