includes/configure_client.php in RaspAP 2.6.6 allows attackers to execute commands via command injection.
References
Link | Resource |
---|---|
https://github.com/RaspAP/raspap-webgui | Product |
https://github.com/RaspAP/raspap-webgui/blob/0e1d652c5e55f812aaf2a5908884e9db179416ee/includes/configure_client.php | Third Party Advisory |
https://zerosecuritypenetrationtesting.com/?page_id=306 | Exploit Third Party Advisory VDB Entry URL Repurposed |
https://github.com/RaspAP/raspap-webgui | Product |
https://github.com/RaspAP/raspap-webgui/blob/0e1d652c5e55f812aaf2a5908884e9db179416ee/includes/configure_client.php | Third Party Advisory |
https://zerosecuritypenetrationtesting.com/?page_id=306 | Exploit Third Party Advisory VDB Entry URL Repurposed |
Configurations
History
21 Nov 2024, 06:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/RaspAP/raspap-webgui - Product | |
References | () https://github.com/RaspAP/raspap-webgui/blob/0e1d652c5e55f812aaf2a5908884e9db179416ee/includes/configure_client.php - Third Party Advisory | |
References | () https://zerosecuritypenetrationtesting.com/?page_id=306 - Exploit, Third Party Advisory, VDB Entry, URL Repurposed |
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://zerosecuritypenetrationtesting.com/?page_id=306 - Exploit, Third Party Advisory, VDB Entry, URL Repurposed |
Information
Published : 2021-08-24 13:15
Updated : 2024-11-21 06:17
NVD link : CVE-2021-38556
Mitre link : CVE-2021-38556
CVE.ORG link : CVE-2021-38556
JSON object : View
Products Affected
raspap
- raspap
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')