Command injection vulnerability in RaspAP raspap-webgui 2.8.8 and earlier allows remote attackers to run arbitrary commands via crafted POST request to hostapd settings form.
References
Link | Resource |
---|---|
https://eldstal.se/advisories/230328-raspap.html | Exploit Mitigation Third Party Advisory |
https://github.com/RaspAP/raspap-webgui/pull/1322 | Patch |
https://eldstal.se/advisories/230328-raspap.html | Exploit Mitigation Third Party Advisory |
https://github.com/RaspAP/raspap-webgui/pull/1322 | Patch |
Configurations
History
21 Nov 2024, 07:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://eldstal.se/advisories/230328-raspap.html - Exploit, Mitigation, Third Party Advisory | |
References | () https://github.com/RaspAP/raspap-webgui/pull/1322 - Patch |
03 Jul 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-23 12:15
Updated : 2024-11-21 07:59
NVD link : CVE-2023-30260
Mitre link : CVE-2023-30260
CVE.ORG link : CVE-2023-30260
JSON object : View
Products Affected
raspap
- raspap
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')