CVE-2025-60787
03.10.2025, 16:16
MotionEye v0.43.1b4 and before is vulnerable to OS Command Injection in configuration parameters such as image_file_name. Unsanitized user input is written to Motion configuration files, allowing remote authenticated attackers with admin access to achieve code execution when Motion is restarted.Enginsight
| Vendor | Product | Version |
|---|---|---|
| motioneye_project | motioneye | 0.42.1 |
| motioneye_project | motioneye | 0.43.1:beta1 |
| motioneye_project | motioneye | 0.43.1:beta2 |
| motioneye_project | motioneye | 0.43.1:beta3 |
| motioneye_project | motioneye | 0.43.1:beta4 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration