Skip to main content

CVE-2025-47782: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in motioneye-project motioneye

High
VulnerabilityCVE-2025-47782cvecve-2025-47782cwe-78
Published: Wed May 14 2025 (05/14/2025, 15:54:59 UTC)
Source: CVE
Vendor/Project: motioneye-project
Product: motioneye

Description

motionEye is an online interface for the software motion, a video surveillance program with motion detection. In versions 0.43.1b1 through 0.43.1b3, using a constructed (camera) device path with the `add`/`add_camera` motionEye web API allows an attacker with motionEye admin user credentials to execute any command within a non-interactive shell as motionEye run user, `motion` by default. The vulnerability has been patched with motionEye v0.43.1b4. As a workaround, apply the patch manually.

AI-Powered Analysis

AILast updated: 07/06/2025, 14:09:42 UTC

Technical Analysis

CVE-2025-47782 is a high-severity OS command injection vulnerability affecting the motionEye project, an online interface for the motion video surveillance software. The vulnerability exists in versions 0.43.1b1 through 0.43.1b3. It arises from improper neutralization of special elements used in OS commands (CWE-78) when processing a crafted camera device path via the motionEye web API endpoints `add` or `add_camera`. An attacker who has administrative credentials to motionEye can exploit this flaw by submitting a specially constructed device path that allows execution of arbitrary commands within a non-interactive shell context. These commands run with the privileges of the motionEye process user, typically the `motion` user. This can lead to unauthorized command execution on the host system, potentially compromising system integrity and confidentiality. The vulnerability does not require user interaction beyond possessing admin credentials, and the attack vector is network-based (remote). The issue has been addressed in motionEye version 0.43.1b4, and users are advised to upgrade or manually apply the patch. No known exploits are currently reported in the wild, but the high CVSS 4.0 score of 8.9 reflects the critical nature of the vulnerability due to its ease of exploitation and impact.

Potential Impact

For European organizations deploying motionEye for video surveillance, this vulnerability poses a significant risk. Successful exploitation could allow attackers to execute arbitrary commands on surveillance servers, potentially leading to full system compromise, data exfiltration, or disruption of surveillance operations. This could impact confidentiality by exposing sensitive video feeds or system data, integrity by allowing tampering with surveillance configurations or logs, and availability by disabling or degrading surveillance services. Organizations in critical infrastructure sectors such as transportation, public safety, and utilities that rely on motionEye for monitoring could face operational disruptions or espionage risks. The requirement for admin credentials somewhat limits the attack surface but insider threats or compromised credentials could enable exploitation. Given the widespread use of motionEye in small to medium enterprises and public sector entities across Europe, the threat is material and warrants immediate remediation.

Mitigation Recommendations

European organizations should prioritize upgrading motionEye installations to version 0.43.1b4 or later to fully remediate the vulnerability. Where immediate upgrade is not feasible, applying the official patch manually is essential. Additionally, organizations should enforce strong administrative credential policies, including multi-factor authentication and regular password rotation, to reduce the risk of credential compromise. Network segmentation should be employed to restrict access to the motionEye web API to trusted management networks only. Monitoring and logging of administrative API calls can help detect suspicious activity indicative of exploitation attempts. Furthermore, implementing host-based intrusion detection systems (HIDS) on surveillance servers can alert on anomalous command executions. Regular vulnerability scanning and penetration testing focused on motionEye deployments will help identify residual risks. Finally, organizations should review and harden the underlying operating system and user permissions for the `motion` user to limit the impact of any potential command execution.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-05-09T19:49:35.620Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec8e7

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 2:09:42 PM

Last updated: 7/31/2025, 8:41:42 PM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats