Description
In RaspAP raspap-webgui 3.3.2 and earlier, a command injection vulnerability exists in the includes/hostapd.php script. The vulnerability is due to improper sanitizing of user input passed via the interface parameter.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-28371 | In RaspAP raspap-webgui 3.3.2 and earlier, a command injection vulnerability exists in the includes/hostapd.php script. The vulnerability is due to improper sanitizing of user input passed via the interface parameter. |
References
History
Tue, 09 Sep 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Raspap
Raspap raspap-webgui |
|
| CPEs | cpe:2.3:a:raspap:raspap-webgui:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Raspap
Raspap raspap-webgui |
Fri, 29 Aug 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-77 | |
| Metrics |
cvssV3_1
|
Wed, 27 Aug 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In RaspAP raspap-webgui 3.3.2 and earlier, a command injection vulnerability exists in the includes/hostapd.php script. The vulnerability is due to improper sanitizing of user input passed via the interface parameter. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-08-29T18:25:35.824Z
Reserved: 2025-06-16T00:00:00.000Z
Link: CVE-2025-50428
Updated: 2025-08-29T18:20:20.780Z
Status : Analyzed
Published: 2025-08-27T17:15:41.443
Modified: 2025-09-09T18:45:52.470
Link: CVE-2025-50428
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD