Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-14950 | motionEye vulnerable to RCE in add_camera Function Due to unsafe command execution |
Github GHSA |
GHSA-g5mq-prx7-c588 | motionEye vulnerable to RCE in add_camera Function Due to unsafe command execution |
Wed, 14 May 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 14 May 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | motionEye is an online interface for the software motion, a video surveillance program with motion detection. In versions 0.43.1b1 through 0.43.1b3, using a constructed (camera) device path with the `add`/`add_camera` motionEye web API allows an attacker with motionEye admin user credentials to execute any command within a non-interactive shell as motionEye run user, `motion` by default. The vulnerability has been patched with motionEye v0.43.1b4. As a workaround, apply the patch manually. | |
| Title | motionEye vulnerable to RCE in add_camera Function Due to unsafe command execution | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-05-14T17:36:32.512Z
Reserved: 2025-05-09T19:49:35.620Z
Link: CVE-2025-47782
Updated: 2025-05-14T17:36:21.073Z
Status : Deferred
Published: 2025-05-14T16:15:29.580
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-47782
No data.
OpenCVE Enrichment
Updated: 2025-06-24T09:44:18Z
EUVD
Github GHSA