Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25643: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in blakeblackshear frigate

0
Critical
Published: Fri Feb 06 2026 (02/06/2026, 19:16:26 UTC)
Source: CVE Database V5
Vendor/Project: blakeblackshear
Product: frigate

Description

CVE-2026-25643 is a critical remote command execution vulnerability in the Frigate NVR software prior to version 0. 16. 4. It arises from improper sanitization of user input in the video stream configuration file (config. yaml), allowing OS command injection via the exec: directive. Exploitation requires administrative privileges or an exposed Frigate instance without authentication, enabling attackers to execute arbitrary system commands. The vulnerability has a CVSS score of 9. 1, reflecting its high impact on confidentiality, integrity, and availability. Although no known exploits are currently in the wild, unpatched systems remain at significant risk. The flaw is fixed in version 0.

AI-Powered Analysis

AILast updated: 02/06/2026, 19:44:30 UTC

Technical Analysis

CVE-2026-25643 is a critical OS command injection vulnerability affecting the Frigate network video recorder (NVR) software, specifically in versions prior to 0.16.4. Frigate integrates with the go2rtc service to handle IP camera video streams. The vulnerability stems from improper neutralization of special elements in user-supplied input within the video stream configuration file (config.yaml). Specifically, the exec: directive allows injection of arbitrary system commands because the go2rtc service executes these commands without adequate input validation or sanitization. This flaw is categorized under CWE-78 (OS Command Injection), CWE-250 (Execution with Unnecessary Privileges), CWE-269 (Improper Privilege Management), and CWE-668 (Exposure of Resource to Wrong Sphere). Exploitation requires either administrative access or an unsecured Frigate installation exposed to the internet without authentication, which would allow any remote attacker to gain full control over the underlying system. The vulnerability has a CVSS v3.1 base score of 9.1, indicating critical severity with network attack vector, low attack complexity, high privileges required, no user interaction, and a scope change affecting confidentiality, integrity, and availability. Although no public exploits are currently reported, the potential for full system compromise makes this a high-risk issue. The vendor fixed the vulnerability in Frigate version 0.16.4 by properly sanitizing inputs and restricting command execution capabilities. Organizations relying on Frigate for IP camera management should upgrade immediately and audit their exposure and access controls to mitigate risk.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of video surveillance systems and potentially the broader network infrastructure. Successful exploitation could allow attackers to execute arbitrary commands with elevated privileges, leading to full system compromise, data exfiltration, manipulation or deletion of video recordings, and disruption of surveillance operations. This is particularly critical for sectors relying heavily on video surveillance for security, such as critical infrastructure, transportation, public safety, and corporate environments. Exposure of Frigate instances to the internet without proper authentication greatly increases attack surface. Given the critical nature of the vulnerability and the widespread use of IP camera systems in Europe, unpatched deployments could be targeted for espionage, sabotage, or ransomware attacks. The impact extends beyond the device itself, as compromised systems could serve as pivot points for lateral movement within organizational networks.

Mitigation Recommendations

1. Immediately upgrade all Frigate installations to version 0.16.4 or later to apply the official patch that fixes the command injection flaw. 2. Restrict network exposure of Frigate instances; avoid direct internet exposure and place devices behind firewalls or VPNs with strict access controls. 3. Enforce strong authentication mechanisms for administrative access to Frigate to prevent unauthorized configuration changes. 4. Regularly audit configuration files (config.yaml) for unauthorized or suspicious entries, especially those involving the exec: directive. 5. Implement network segmentation to isolate surveillance systems from critical IT infrastructure, limiting potential lateral movement. 6. Monitor logs and system behavior for signs of exploitation attempts or unusual command executions. 7. Educate administrators on secure configuration practices and the risks of exposing management interfaces publicly. 8. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous command execution patterns related to Frigate or go2rtc services.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-04T05:15:41.791Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69864142f9fa50a62f2a7496

Added to database: 2/6/2026, 7:30:10 PM

Last enriched: 2/6/2026, 7:44:30 PM

Last updated: 2/6/2026, 8:39:24 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats