CVE-2026-25643
Published: 06 February 2026
Description
Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. Prior to 0.16.4, a critical Remote Command Execution (RCE) vulnerability has been identified in the Frigate integration with go2rtc. The application does not sanitize user…
more
input in the video stream configuration (config.yaml), allowing direct injection of system commands via the exec: directive. The go2rtc service executes these commands without restrictions. This vulnerability is only exploitable by an administrator or users who have exposed their Frigate install to the open internet with no authentication which allows anyone full administrative control. This vulnerability is fixed in 0.16.4.
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the command injection flaw by requiring timely installation of the patch in Frigate version 0.16.4.
Validates and sanitizes user inputs in the config.yaml file to block injection of arbitrary system commands via the exec: directive.
Enforces least privilege on the go2rtc service to restrict the scope and impact of any executed commands from injected inputs.
Security SummaryAI
CVE-2026-25643 is a critical remote command execution (RCE) vulnerability affecting Frigate, an open-source network video recorder (NVR) with realtime local object detection for IP cameras, in versions prior to 0.16.4. The issue resides in the Frigate integration with go2rtc, where the application fails to sanitize user input within the video stream configuration file (config.yaml). This allows attackers to inject arbitrary system commands using the exec: directive, which the go2rtc service then executes without restrictions. The vulnerability is associated with CWEs-78 (OS Command Injection), CWE-250 (Execution with Unnecessary Privileges), CWE-269 (Improper Privilege Management), and CWE-668 (Excessive Exposure of Sensitive Information to an Unauthorized Process), and carries a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Exploitation requires high privileges, specifically an administrator account, though it becomes accessible to unauthenticated remote attackers if the Frigate installation is exposed to the open internet without authentication controls. Successful exploitation grants full administrative control over the system, enabling complete confidentiality, integrity, and availability impacts through arbitrary command execution on the host.
The vulnerability has been addressed in Frigate version 0.16.4, as detailed in the official release notes and GitHub security advisory GHSA-4c97-5jmr-8f6x. Security practitioners should immediately upgrade to 0.16.4 or later, ensure Frigate instances are not exposed to the public internet without authentication, and review config.yaml files for any malicious exec: directives.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability enables remote code execution via OS command injection in a public-facing NVR application (T1190), facilitating arbitrary command execution through a Unix shell interpreter (T1059.004).