vendor:
RaspAP WebGUI
by:
Moritz Gruber
9,8
CVSS
HIGH
Remote Code Execution
78
CWE
Product Name: RaspAP WebGUI
Affected Version From: 2.6.6
Affected Version To: 2.6.6
Patch Exists: YES
Related CWE: N/A
CPE: a:raspap:raspap_webgui
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux raspberrypi 5.10.52-v7+
2021
RaspAP 2.6.6 – Remote Code Execution (RCE) (Authenticated)
A vulnerability in RaspAP 2.6.6 allows an authenticated user to execute arbitrary code on the target system. This is achieved by sending a malicious payload to the /wpa_conf endpoint, which is then executed by the system. The payload is sent using a POST request with the user's credentials, and the malicious code is stored in the 'connect' parameter.
Mitigation:
Ensure that all users have strong passwords and that the system is kept up to date with the latest security patches.