Show filters
10 Total Results
Displaying 1-10 of 10
Sort by:
Attacker Value
Low
CVE-2022-39986
Disclosure Date: August 01, 2023 (last updated October 08, 2023)
A Command injection vulnerability in RaspAP 2.8.0 thru 2.8.7 allows unauthenticated attackers to execute arbitrary commands via the cfg_id parameter in /ajax/openvpn/activate_ovpncfg.php and /ajax/openvpn/del_ovpncfg.php.
2
Attacker Value
Unknown
CVE-2024-2497
Disclosure Date: March 15, 2024 (last updated April 11, 2024)
A vulnerability was found in RaspAP raspap-webgui 3.0.9 and classified as critical. This issue affects some unknown processing of the file includes/provider.php of the component HTTP POST Request Handler. The manipulation of the argument country leads to code injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-256919. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
0
Attacker Value
Unknown
CVE-2022-39987
Disclosure Date: August 01, 2023 (last updated October 08, 2023)
A Command injection vulnerability in RaspAP 2.8.0 thru 2.9.2 allows an authenticated attacker to execute arbitrary OS commands as root via the "entity" POST parameters in /ajax/networking/get_wgkey.php.
0
Attacker Value
Unknown
CVE-2023-30260
Disclosure Date: June 23, 2023 (last updated October 08, 2023)
Command injection vulnerability in RaspAP raspap-webgui 2.8.8 and earlier allows remote attackers to run arbitrary commands via crafted POST request to hostapd settings form.
0
Attacker Value
Unknown
CVE-2021-38556
Disclosure Date: August 24, 2021 (last updated February 23, 2025)
includes/configure_client.php in RaspAP 2.6.6 allows attackers to execute commands via command injection.
0
Attacker Value
Unknown
CVE-2021-38557
Disclosure Date: August 24, 2021 (last updated February 23, 2025)
raspap-webgui in RaspAP 2.6.6 allows attackers to execute commands as root because of the insecure sudoers permissions. The www-data account can execute /etc/raspap/hostapd/enablelog.sh as root with no password; however, the www-data account can also overwrite /etc/raspap/hostapd/enablelog.sh with any executable content.
0
Attacker Value
Unknown
CVE-2021-33357
Disclosure Date: June 09, 2021 (last updated February 22, 2025)
A vulnerability exists in RaspAP 2.6 to 2.6.5 in the "iface" GET parameter in /ajax/networking/get_netcfg.php, when the "iface" parameter value contains special characters such as ";" which enables an unauthenticated attacker to execute arbitrary OS commands.
0
Attacker Value
Unknown
CVE-2021-33356
Disclosure Date: June 09, 2021 (last updated February 22, 2025)
Multiple privilege escalation vulnerabilities in RaspAP 1.5 to 2.6.5 could allow an authenticated remote attacker to inject arbitrary commands to /installers/common.sh component that can result in remote command execution with root privileges.
0
Attacker Value
Unknown
CVE-2021-33358
Disclosure Date: June 09, 2021 (last updated February 22, 2025)
Multiple vulnerabilities exist in RaspAP 2.3 to 2.6.5 in the "interface", "ssid" and "wpa_passphrase" POST parameters in /hostapd, when the parameter values contain special characters such as ";" or "$()" which enables an authenticated attacker to execute arbitrary OS commands.
0
Attacker Value
Unknown
CVE-2020-24572
Disclosure Date: August 24, 2020 (last updated February 22, 2025)
An issue was discovered in includes/webconsole.php in RaspAP 2.5. With authenticated access, an attacker can use a misconfigured (and virtually unrestricted) web console to attack the underlying OS (Raspberry Pi) running this software, and execute commands on the system (including ones for uploading of files and execution of code).
0