CVE-2023-30260

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-30260
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-30260.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-30260
Aliases
Published
2023-06-23T12:15:09Z
Modified
2024-09-03T04:30:05.424570Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Command injection vulnerability in RaspAP raspap-webgui 2.8.8 and earlier allows remote attackers to run arbitrary commands via crafted POST request to hostapd settings form.

References

Affected packages

Git / github.com/billz/raspap-webgui

Affected ranges

Type
GIT
Repo
https://github.com/billz/raspap-webgui
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

1.*

1.3.1
1.4.0
1.4.1
1.5
1.5.1
1.6
1.6.1
1.6.2

2.*

2.0
2.1
2.2
2.3
2.3.1
2.4
2.4-beta
2.4.1
2.5
2.5.1
2.5.2
2.6
2.6-beta
2.6.1
2.6.2
2.6.3
2.6.4
2.6.5
2.6.6
2.6.7
2.6.8
2.6.9
2.7.0
2.7.1
2.8.0
2.8.1
2.8.2
2.8.3
2.8.4
2.8.5
2.8.6
2.8.7
2.8.8

v1.*

v1.0
v1.1
v1.2.0
v1.2.1
v1.3.0