CVE-2021-38557

HIGH

RaspAP 2.6.6 - Command Injection

Title source: llm
STIX 2.1

Description

raspap-webgui in RaspAP 2.6.6 allows attackers to execute commands as root because of the insecure sudoers permissions. The www-data account can execute /etc/raspap/hostapd/enablelog.sh as root with no password; however, the www-data account can also overwrite /etc/raspap/hostapd/enablelog.sh with any executable content.

References (3)

Core 3
Core References
Product x_refsource_misc
https://github.com/RaspAP/raspap-webgui
Exploit, Third Party Advisory, URL Repurposed x_refsource_misc
https://zerosecuritypenetrationtesting.com/?page_id=306

Scores

CVSS v3 8.8
EPSS 0.0073
EPSS Percentile 72.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-732
Status published
Products (2)
billz/raspap-webgui 0Packagist
raspap/raspap 2.6.6
Published Aug 24, 2021
Tracked Since Feb 18, 2026