In RaspAP raspap-webgui 3.3.2 and earlier, a command injection vulnerability exists in the includes/hostapd.php script. The vulnerability is due to improper sanitizing of user input passed via the interface parameter.
References
| Link | Resource |
|---|---|
| https://blog.smarttecs.com/posts/2025-004-cve-2025-50428/ | Exploit Third Party Advisory |
| https://github.com/RaspAP/raspap-webgui/pull/1833 | Issue Tracking Patch |
| https://blog.smarttecs.com/posts/2025-004-cve-2025-50428/ | Exploit Third Party Advisory |
Configurations
History
09 Sep 2025, 18:45
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://blog.smarttecs.com/posts/2025-004-cve-2025-50428/ - Exploit, Third Party Advisory | |
| References | () https://github.com/RaspAP/raspap-webgui/pull/1833 - Issue Tracking, Patch | |
| First Time |
Raspap raspap-webgui
Raspap |
|
| CPE | cpe:2.3:a:raspap:raspap-webgui:*:*:*:*:*:*:*:* |
29 Aug 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| CWE | CWE-77 | |
| References | () https://blog.smarttecs.com/posts/2025-004-cve-2025-50428/ - |
29 Aug 2025, 16:24
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
27 Aug 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-08-27 17:15
Updated : 2025-09-09 18:45
NVD link : CVE-2025-50428
Mitre link : CVE-2025-50428
CVE.ORG link : CVE-2025-50428
JSON object : View
Products Affected
raspap
- raspap-webgui
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
