CVE-2020-24572

HIGH

RaspAP 2.5 - Authenticated OS Command Injection via Web Console

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 2 public exploits for CVE-2020-24572. PoCs published by gerbsec, lb0x.

AI-analyzed exploit summary This is a functional exploit for CVE-2020-24572, targeting an authenticated RCE vulnerability in RaspAP 2.5 via the webconsole.php endpoint. It allows command execution through a misconfigured web console, with options for multiple reverse shell payloads.

Description

An issue was discovered in includes/webconsole.php in RaspAP 2.5. With authenticated access, an attacker can use a misconfigured (and virtually unrestricted) web console to attack the underlying OS (Raspberry Pi) running this software, and execute commands on the system (including ones for uploading of files and execution of code).

Exploits (2)

nomisec WORKING POC 7 stars
by gerbsec · poc
https://github.com/gerbsec/CVE-2020-24572-POC

This is a functional exploit for CVE-2020-24572, targeting an authenticated RCE vulnerability in RaspAP 2.5 via the webconsole.php endpoint. It allows command execution through a misconfigured web console, with options for multiple reverse shell payloads.

Classification
Working Poc 95%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target: RaspAP v2.5
Auth required
Prerequisites: Authenticated access to RaspAP admin panel · Network connectivity to target · Listener setup for reverse shell
devstral-2 · analyzed Feb 16, 2026 Full analysis →
nomisec WORKING POC 4 stars
by lb0x · poc
https://github.com/lb0x/cve-2020-24572

This PoC exploits an authenticated RCE vulnerability in RaspAP 2.5 via a misconfigured web console. It injects a reverse shell payload into a configuration file and triggers its execution.

Classification
Working Poc 95%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target: RaspAP 2.5
Auth required
Prerequisites: Authenticated access to RaspAP admin panel · Network connectivity to target · Listener setup for reverse shell
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (4)

Core 4
Core References
Release Notes, Third Party Advisory x_refsource_misc
https://github.com/billz/raspap-webgui/releases
Third Party Advisory x_refsource_misc
https://github.com/lb0x
Exploit, Third Party Advisory x_refsource_misc
https://deadb0x.io/lunchb0x/cve-2020-24572/

Scores

CVSS v3 8.8
EPSS 0.4214
EPSS Percentile 97.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-78
Status published
Products (1)
raspap/raspap 2.5
Published Aug 24, 2020
Tracked Since Feb 18, 2026