Raspap

Raspap

13 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.13%
  • Veröffentlicht 29.07.2024 06:15:02
  • Zuletzt bearbeitet 21.11.2024 09:32:54

RaspAP before 3.1.5 allows an attacker to escalate privileges: the www-data user has write access to the restapi.service file and also possesses Sudo privileges to execute several critical commands without a password.

Exploit
  • EPSS 0.06%
  • Veröffentlicht 15.03.2024 17:15:08
  • Zuletzt bearbeitet 09.04.2025 15:29:46

A vulnerability was found in RaspAP raspap-webgui 3.0.9 and classified as critical. This issue affects some unknown processing of the file includes/provider.php of the component HTTP POST Request Handler. The manipulation of the argument country lead...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 09.03.2024 00:15:59
  • Zuletzt bearbeitet 01.05.2025 00:17:11

RaspAP (aka raspap-webgui) through 3.0.9 allows remote attackers to read the /etc/passwd file via a crafted request.

Exploit
  • EPSS 0.36%
  • Veröffentlicht 09.03.2024 00:15:59
  • Zuletzt bearbeitet 01.05.2025 00:13:29

RaspAP (aka raspap-webgui) through 3.0.9 allows remote attackers to cause a persistent denial of service (bricking) via a crafted request.

  • EPSS 93.06%
  • Veröffentlicht 01.08.2023 14:15:09
  • Zuletzt bearbeitet 21.11.2024 07:18:35

A Command injection vulnerability in RaspAP 2.8.0 thru 2.8.7 allows unauthenticated attackers to execute arbitrary commands via the cfg_id parameter in /ajax/openvpn/activate_ovpncfg.php and /ajax/openvpn/del_ovpncfg.php.

  • EPSS 76.35%
  • Veröffentlicht 01.08.2023 14:15:09
  • Zuletzt bearbeitet 21.11.2024 07:18:36

A Command injection vulnerability in RaspAP 2.8.0 thru 2.9.2 allows an authenticated attacker to execute arbitrary OS commands as root via the "entity" POST parameters in /ajax/networking/get_wgkey.php.

Exploit
  • EPSS 2.67%
  • Veröffentlicht 23.06.2023 12:15:09
  • Zuletzt bearbeitet 21.11.2024 07:59:57

Command injection vulnerability in RaspAP raspap-webgui 2.8.8 and earlier allows remote attackers to run arbitrary commands via crafted POST request to hostapd settings form.

Exploit
  • EPSS 18.64%
  • Veröffentlicht 24.08.2021 13:15:14
  • Zuletzt bearbeitet 21.11.2024 06:17:26

includes/configure_client.php in RaspAP 2.6.6 allows attackers to execute commands via command injection.

Exploit
  • EPSS 0.73%
  • Veröffentlicht 24.08.2021 13:15:14
  • Zuletzt bearbeitet 21.11.2024 06:17:26

raspap-webgui in RaspAP 2.6.6 allows attackers to execute commands as root because of the insecure sudoers permissions. The www-data account can execute /etc/raspap/hostapd/enablelog.sh as root with no password; however, the www-data account can also...

Exploit
  • EPSS 11.12%
  • Veröffentlicht 09.06.2021 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:08:44

Multiple privilege escalation vulnerabilities in RaspAP 1.5 to 2.6.5 could allow an authenticated remote attacker to inject arbitrary commands to /installers/common.sh component that can result in remote command execution with root privileges.