Home

Description

MotionEye v0.43.1b4 and before is vulnerable to OS Command Injection in configuration parameters such as image_file_name. Unsanitized user input is written to Motion configuration files, allowing remote authenticated attackers with admin access to achieve code execution when Motion is restarted.

PUBLISHED Reserved 2025-09-26 | Published 2025-10-03 | Updated 2025-10-03 | Assigner mitre

References

motioneye-project.com

github.com/...verma47/motionEye-RCE-through-config-parameter

cve.org (CVE-2025-60787)

nvd.nist.gov (CVE-2025-60787)

Download JSON