ID |
CVE-2025-44163
|
Sažetak |
RaspAP raspap-webgui 3.3.1 is vulnerable to Directory Traversal in ajax/networking/get_wgkey.php. An authenticated attacker can send a crafted POST request with a path traversal payload in the `entity` parameter to overwrite arbitrary files writable by the web server via abuse of the `tee` command used in shell execution. |
Reference |
|
CVSS |
Base: | 6.3 |
Impact: | 3.4 |
Exploitability: | 2.8 |
|
Pristup |
Vektor | Složenost | Autentikacija |
NETWORK |
LOW |
NONE |
|
Impact |
Povjerljivost | Cjelovitost | Dostupnost |
LOW |
LOW |
LOW |
|
CVSS vektor |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L |
Zadnje važnije ažuriranje |
27-06-2025 - 20:15 |
Objavljeno |
27-06-2025 - 14:15 |