CVE-2025-47782: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in motioneye-project motioneye
motionEye is an online interface for the software motion, a video surveillance program with motion detection. In versions 0.43.1b1 through 0.43.1b3, using a constructed (camera) device path with the `add`/`add_camera` motionEye web API allows an attacker with motionEye admin user credentials to execute any command within a non-interactive shell as motionEye run user, `motion` by default. The vulnerability has been patched with motionEye v0.43.1b4. As a workaround, apply the patch manually.
AI Analysis
Technical Summary
CVE-2025-47782 is a high-severity OS command injection vulnerability affecting the motionEye project, an online interface for the motion video surveillance software. The vulnerability exists in versions 0.43.1b1 through 0.43.1b3. It arises from improper neutralization of special elements used in OS commands (CWE-78) when processing a crafted camera device path via the motionEye web API endpoints `add` or `add_camera`. An attacker who has administrative credentials to motionEye can exploit this flaw by submitting a specially constructed device path that allows execution of arbitrary commands within a non-interactive shell context. These commands run with the privileges of the motionEye process user, typically the `motion` user. This can lead to unauthorized command execution on the host system, potentially compromising system integrity and confidentiality. The vulnerability does not require user interaction beyond possessing admin credentials, and the attack vector is network-based (remote). The issue has been addressed in motionEye version 0.43.1b4, and users are advised to upgrade or manually apply the patch. No known exploits are currently reported in the wild, but the high CVSS 4.0 score of 8.9 reflects the critical nature of the vulnerability due to its ease of exploitation and impact.
Potential Impact
For European organizations deploying motionEye for video surveillance, this vulnerability poses a significant risk. Successful exploitation could allow attackers to execute arbitrary commands on surveillance servers, potentially leading to full system compromise, data exfiltration, or disruption of surveillance operations. This could impact confidentiality by exposing sensitive video feeds or system data, integrity by allowing tampering with surveillance configurations or logs, and availability by disabling or degrading surveillance services. Organizations in critical infrastructure sectors such as transportation, public safety, and utilities that rely on motionEye for monitoring could face operational disruptions or espionage risks. The requirement for admin credentials somewhat limits the attack surface but insider threats or compromised credentials could enable exploitation. Given the widespread use of motionEye in small to medium enterprises and public sector entities across Europe, the threat is material and warrants immediate remediation.
Mitigation Recommendations
European organizations should prioritize upgrading motionEye installations to version 0.43.1b4 or later to fully remediate the vulnerability. Where immediate upgrade is not feasible, applying the official patch manually is essential. Additionally, organizations should enforce strong administrative credential policies, including multi-factor authentication and regular password rotation, to reduce the risk of credential compromise. Network segmentation should be employed to restrict access to the motionEye web API to trusted management networks only. Monitoring and logging of administrative API calls can help detect suspicious activity indicative of exploitation attempts. Furthermore, implementing host-based intrusion detection systems (HIDS) on surveillance servers can alert on anomalous command executions. Regular vulnerability scanning and penetration testing focused on motionEye deployments will help identify residual risks. Finally, organizations should review and harden the underlying operating system and user permissions for the `motion` user to limit the impact of any potential command execution.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-47782: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in motioneye-project motioneye
Description
motionEye is an online interface for the software motion, a video surveillance program with motion detection. In versions 0.43.1b1 through 0.43.1b3, using a constructed (camera) device path with the `add`/`add_camera` motionEye web API allows an attacker with motionEye admin user credentials to execute any command within a non-interactive shell as motionEye run user, `motion` by default. The vulnerability has been patched with motionEye v0.43.1b4. As a workaround, apply the patch manually.
AI-Powered Analysis
Technical Analysis
CVE-2025-47782 is a high-severity OS command injection vulnerability affecting the motionEye project, an online interface for the motion video surveillance software. The vulnerability exists in versions 0.43.1b1 through 0.43.1b3. It arises from improper neutralization of special elements used in OS commands (CWE-78) when processing a crafted camera device path via the motionEye web API endpoints `add` or `add_camera`. An attacker who has administrative credentials to motionEye can exploit this flaw by submitting a specially constructed device path that allows execution of arbitrary commands within a non-interactive shell context. These commands run with the privileges of the motionEye process user, typically the `motion` user. This can lead to unauthorized command execution on the host system, potentially compromising system integrity and confidentiality. The vulnerability does not require user interaction beyond possessing admin credentials, and the attack vector is network-based (remote). The issue has been addressed in motionEye version 0.43.1b4, and users are advised to upgrade or manually apply the patch. No known exploits are currently reported in the wild, but the high CVSS 4.0 score of 8.9 reflects the critical nature of the vulnerability due to its ease of exploitation and impact.
Potential Impact
For European organizations deploying motionEye for video surveillance, this vulnerability poses a significant risk. Successful exploitation could allow attackers to execute arbitrary commands on surveillance servers, potentially leading to full system compromise, data exfiltration, or disruption of surveillance operations. This could impact confidentiality by exposing sensitive video feeds or system data, integrity by allowing tampering with surveillance configurations or logs, and availability by disabling or degrading surveillance services. Organizations in critical infrastructure sectors such as transportation, public safety, and utilities that rely on motionEye for monitoring could face operational disruptions or espionage risks. The requirement for admin credentials somewhat limits the attack surface but insider threats or compromised credentials could enable exploitation. Given the widespread use of motionEye in small to medium enterprises and public sector entities across Europe, the threat is material and warrants immediate remediation.
Mitigation Recommendations
European organizations should prioritize upgrading motionEye installations to version 0.43.1b4 or later to fully remediate the vulnerability. Where immediate upgrade is not feasible, applying the official patch manually is essential. Additionally, organizations should enforce strong administrative credential policies, including multi-factor authentication and regular password rotation, to reduce the risk of credential compromise. Network segmentation should be employed to restrict access to the motionEye web API to trusted management networks only. Monitoring and logging of administrative API calls can help detect suspicious activity indicative of exploitation attempts. Furthermore, implementing host-based intrusion detection systems (HIDS) on surveillance servers can alert on anomalous command executions. Regular vulnerability scanning and penetration testing focused on motionEye deployments will help identify residual risks. Finally, organizations should review and harden the underlying operating system and user permissions for the `motion` user to limit the impact of any potential command execution.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-05-09T19:49:35.620Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aec8e7
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 7/6/2025, 2:09:42 PM
Last updated: 7/31/2025, 8:41:42 PM
Views: 7
Related Threats
Researcher to release exploit for full auth bypass on FortiWeb
HighCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.