CVE-2024-41637
- EPSS 0.13%
- Veröffentlicht 29.07.2024 06:15:02
- Zuletzt bearbeitet 21.11.2024 09:32:54
RaspAP before 3.1.5 allows an attacker to escalate privileges: the www-data user has write access to the restapi.service file and also possesses Sudo privileges to execute several critical commands without a password.
CVE-2024-2497
- EPSS 0.06%
- Veröffentlicht 15.03.2024 17:15:08
- Zuletzt bearbeitet 09.04.2025 15:29:46
A vulnerability was found in RaspAP raspap-webgui 3.0.9 and classified as critical. This issue affects some unknown processing of the file includes/provider.php of the component HTTP POST Request Handler. The manipulation of the argument country lead...
CVE-2024-28753
- EPSS 0.06%
- Veröffentlicht 09.03.2024 00:15:59
- Zuletzt bearbeitet 01.05.2025 00:17:11
RaspAP (aka raspap-webgui) through 3.0.9 allows remote attackers to read the /etc/passwd file via a crafted request.
CVE-2024-28754
- EPSS 0.36%
- Veröffentlicht 09.03.2024 00:15:59
- Zuletzt bearbeitet 01.05.2025 00:13:29
RaspAP (aka raspap-webgui) through 3.0.9 allows remote attackers to cause a persistent denial of service (bricking) via a crafted request.
CVE-2022-39986
- EPSS 93.06%
- Veröffentlicht 01.08.2023 14:15:09
- Zuletzt bearbeitet 21.11.2024 07:18:35
A Command injection vulnerability in RaspAP 2.8.0 thru 2.8.7 allows unauthenticated attackers to execute arbitrary commands via the cfg_id parameter in /ajax/openvpn/activate_ovpncfg.php and /ajax/openvpn/del_ovpncfg.php.
CVE-2022-39987
- EPSS 76.35%
- Veröffentlicht 01.08.2023 14:15:09
- Zuletzt bearbeitet 21.11.2024 07:18:36
A Command injection vulnerability in RaspAP 2.8.0 thru 2.9.2 allows an authenticated attacker to execute arbitrary OS commands as root via the "entity" POST parameters in /ajax/networking/get_wgkey.php.
CVE-2023-30260
- EPSS 2.67%
- Veröffentlicht 23.06.2023 12:15:09
- Zuletzt bearbeitet 21.11.2024 07:59:57
Command injection vulnerability in RaspAP raspap-webgui 2.8.8 and earlier allows remote attackers to run arbitrary commands via crafted POST request to hostapd settings form.
CVE-2021-38556
- EPSS 18.64%
- Veröffentlicht 24.08.2021 13:15:14
- Zuletzt bearbeitet 21.11.2024 06:17:26
includes/configure_client.php in RaspAP 2.6.6 allows attackers to execute commands via command injection.
- EPSS 0.73%
- Veröffentlicht 24.08.2021 13:15:14
- Zuletzt bearbeitet 21.11.2024 06:17:26
raspap-webgui in RaspAP 2.6.6 allows attackers to execute commands as root because of the insecure sudoers permissions. The www-data account can execute /etc/raspap/hostapd/enablelog.sh as root with no password; however, the www-data account can also...
- EPSS 11.12%
- Veröffentlicht 09.06.2021 18:15:08
- Zuletzt bearbeitet 21.11.2024 06:08:44
Multiple privilege escalation vulnerabilities in RaspAP 1.5 to 2.6.5 could allow an authenticated remote attacker to inject arbitrary commands to /installers/common.sh component that can result in remote command execution with root privileges.