Authenticated Remote Code Execution affects Mobotix P3 and Mx6 cameras
A command injection vulnerability in Mobotix P3 and Mx6 IP cameras allows an authenticated attacker to execute arbitrary system commands with elevated privileges. The vulnerability exists in an input validation flaw where user-supplied data is passed unsanitized to a system command handler. Affected P3 firmware versions include MX-V4.1.4.11 through MX-V4.1.6.25 and later versions before MX-V4.7.2.18. Affected Mx6 firmware versions include MX-V5.0.0.127 through MX-V5.0.0.133 and later versions before MX-V5.2.0.61. An attacker who gains valid authentication credentials can leverage this vulnerability to take full control of the camera device and potentially pivot into adjacent network systems.
- Valid credentials (engineering or administrator account) for camera login
- Network access to the camera's web interface or API (typically TCP port 443 or 80)
- Camera must be accessible from the attacker's network segment
Patching may require device reboot — plan for process interruption
/api/v1/advisories/b260d41e-8d4e-4a7a-a5e7-06db80fa544d