Description
raspap-webgui in RaspAP 2.6.6 allows attackers to execute commands as root because of the insecure sudoers permissions. The www-data account can execute /etc/raspap/hostapd/enablelog.sh as root with no password; however, the www-data account can also overwrite /etc/raspap/hostapd/enablelog.sh with any executable content.
References (3)
Core 3
Core References
Product x_refsource_misc
https://github.com/RaspAP/raspap-webgui
Third Party Advisory x_refsource_misc
https://github.com/RaspAP/raspap-webgui/blob/fabc48c7daae4013b9888f266332e510b196a062/installers/raspap.sudoers
Exploit, Third Party Advisory, URL Repurposed x_refsource_misc
https://zerosecuritypenetrationtesting.com/?page_id=306
Scores
CVSS v3
8.8
EPSS
0.0073
EPSS Percentile
72.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-732
Status
published
Products (2)
billz/raspap-webgui
0Packagist
raspap/raspap
2.6.6
Published
Aug 24, 2021
Tracked Since
Feb 18, 2026