Skip to content

Commit 67ff15e

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 91c0adb commit 67ff15e

File tree

1 file changed

+59
-0
lines changed

1 file changed

+59
-0
lines changed

db/modules_metadata_base.json

Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -78961,6 +78961,65 @@
7896178961
"session_types": false,
7896278962
"needs_cleanup": null
7896378963
},
78964+
"exploit_linux/http/motioneye_auth_rce_cve_2025_60787": {
78965+
"name": "Remote Code Execution Vulnerability in MotionEye Frontend (CVE-2025-60787)",
78966+
"fullname": "exploit/linux/http/motioneye_auth_rce_cve_2025_60787",
78967+
"aliases": [],
78968+
"rank": 600,
78969+
"disclosure_date": "2025-09-09",
78970+
"type": "exploit",
78971+
"author": [
78972+
"Maksim Rogov",
78973+
"prabhatverma47"
78974+
],
78975+
"description": "This module exploits a template injection vulnerability in the MotionEye Frontend.\n\n MotionEye Frontend versions 0.43.1b4 and prior are vulnerable to OS Command Injection in configuration parameters such as image_file_name.\n Unsanitized user input is written to MotionEye Frontend configuration files, allowing remote authenticated attackers with admin access to achieve code execution.\n\n Successful exploitation will result in the command executing as the user running\n the web server, potentially exposing sensitive data or disrupting survey operations.\n\n An attacker can execute arbitrary system commands in the context of the user running the web server.",
78976+
"references": [
78977+
"CVE-2025-60787",
78978+
"URL-https://github.com/prabhatverma47/motionEye-RCE-through-config-parameter"
78979+
],
78980+
"platform": "Linux,Unix",
78981+
"arch": "cmd",
78982+
"rport": 80,
78983+
"autofilter_ports": [
78984+
80,
78985+
8080,
78986+
443,
78987+
8000,
78988+
8888,
78989+
8880,
78990+
8008,
78991+
3000,
78992+
8443
78993+
],
78994+
"autofilter_services": [
78995+
"http",
78996+
"https"
78997+
],
78998+
"targets": [
78999+
"Unix Command"
79000+
],
79001+
"mod_time": "2025-10-09 21:51:31 +0000",
79002+
"path": "/modules/exploits/linux/http/motioneye_auth_rce_cve_2025_60787.rb",
79003+
"is_install_path": true,
79004+
"ref_name": "linux/http/motioneye_auth_rce_cve_2025_60787",
79005+
"check": true,
79006+
"post_auth": true,
79007+
"default_credential": false,
79008+
"notes": {
79009+
"Stability": [
79010+
"crash-safe"
79011+
],
79012+
"SideEffects": [
79013+
"ioc-in-logs",
79014+
"artifacts-on-disk"
79015+
],
79016+
"Reliability": [
79017+
"repeatable-session"
79018+
]
79019+
},
79020+
"session_types": false,
79021+
"needs_cleanup": null
79022+
},
7896479023
"exploit_linux/http/multi_ncc_ping_exec": {
7896579024
"name": "D-Link/TRENDnet NCC Service Command Injection",
7896679025
"fullname": "exploit/linux/http/multi_ncc_ping_exec",

0 commit comments

Comments
 (0)