CVE-2020-24572
HIGHRaspAP 2.5 - Authenticated OS Command Injection via Web Console
Title source: llmExploitation Summary
EIP tracks 2 public exploits for CVE-2020-24572. PoCs published by gerbsec, lb0x.
AI-analyzed exploit summary This is a functional exploit for CVE-2020-24572, targeting an authenticated RCE vulnerability in RaspAP 2.5 via the webconsole.php endpoint. It allows command execution through a misconfigured web console, with options for multiple reverse shell payloads.
Description
An issue was discovered in includes/webconsole.php in RaspAP 2.5. With authenticated access, an attacker can use a misconfigured (and virtually unrestricted) web console to attack the underlying OS (Raspberry Pi) running this software, and execute commands on the system (including ones for uploading of files and execution of code).
Exploits (2)
This is a functional exploit for CVE-2020-24572, targeting an authenticated RCE vulnerability in RaspAP 2.5 via the webconsole.php endpoint. It allows command execution through a misconfigured web console, with options for multiple reverse shell payloads.
This PoC exploits an authenticated RCE vulnerability in RaspAP 2.5 via a misconfigured web console. It injects a reverse shell payload into a configuration file and triggers its execution.
References (4)
Scores
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H