Cyber Posture

CVE-2026-25643

CriticalPublic PoC

Published: 06 February 2026

Published
06 February 2026
Modified
11 February 2026
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0126 79.6th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Description

Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. Prior to 0.16.4, a critical Remote Command Execution (RCE) vulnerability has been identified in the Frigate integration with go2rtc. The application does not sanitize user…

more

input in the video stream configuration (config.yaml), allowing direct injection of system commands via the exec: directive. The go2rtc service executes these commands without restrictions. This vulnerability is only exploitable by an administrator or users who have exposed their Frigate install to the open internet with no authentication which allows anyone full administrative control. This vulnerability is fixed in 0.16.4.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the command injection flaw by requiring timely installation of the patch in Frigate version 0.16.4.

prevent

Validates and sanitizes user inputs in the config.yaml file to block injection of arbitrary system commands via the exec: directive.

prevent

Enforces least privilege on the go2rtc service to restrict the scope and impact of any executed commands from injected inputs.

Security SummaryAI

CVE-2026-25643 is a critical remote command execution (RCE) vulnerability affecting Frigate, an open-source network video recorder (NVR) with realtime local object detection for IP cameras, in versions prior to 0.16.4. The issue resides in the Frigate integration with go2rtc, where the application fails to sanitize user input within the video stream configuration file (config.yaml). This allows attackers to inject arbitrary system commands using the exec: directive, which the go2rtc service then executes without restrictions. The vulnerability is associated with CWEs-78 (OS Command Injection), CWE-250 (Execution with Unnecessary Privileges), CWE-269 (Improper Privilege Management), and CWE-668 (Excessive Exposure of Sensitive Information to an Unauthorized Process), and carries a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Exploitation requires high privileges, specifically an administrator account, though it becomes accessible to unauthenticated remote attackers if the Frigate installation is exposed to the open internet without authentication controls. Successful exploitation grants full administrative control over the system, enabling complete confidentiality, integrity, and availability impacts through arbitrary command execution on the host.

The vulnerability has been addressed in Frigate version 0.16.4, as detailed in the official release notes and GitHub security advisory GHSA-4c97-5jmr-8f6x. Security practitioners should immediately upgrade to 0.16.4 or later, ensure Frigate instances are not exposed to the public internet without authentication, and review config.yaml files for any malicious exec: directives.

Details

CWE(s)

Affected Products

frigate
frigate
≤ 0.16.4

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

The vulnerability enables remote code execution via OS command injection in a public-facing NVR application (T1190), facilitating arbitrary command execution through a Unix shell interpreter (T1059.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References