CVE-2022-39986

CRITICAL EXPLOITED NUCLEI

Raspap < 2.8.7 - Command Injection

Title source: rule

Description

A Command injection vulnerability in RaspAP 2.8.0 thru 2.8.7 allows unauthenticated attackers to execute arbitrary commands via the cfg_id parameter in /ajax/openvpn/activate_ovpncfg.php and /ajax/openvpn/del_ovpncfg.php.

Exploits (3)

nomisec WORKING POC
by mind2hex · remote
https://github.com/mind2hex/CVE-2022-39986-RaspAP-2.8.0-2.8.7-RCE
nomisec WORKING POC
by tucommenceapousser · remote
https://github.com/tucommenceapousser/RaspAP-CVE-2022-39986-PoC
metasploit WORKING POC EXCELLENT
rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/http/raspap_rce.rb

Nuclei Templates (1)

RaspAP 2.8.7 - Unauthenticated Command Injection
CRITICALVERIFIEDby DhiyaneshDK
Shodan: http.favicon.hash:-1465760059
FOFA: icon_hash=-1465760059

Scores

CVSS v3 9.8
EPSS 0.9306
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2023-11-13
CWE
CWE-77
Status published
Products (2)
billz/raspap-webgui 2.8.0 - 2.8.8Packagist
raspap/raspap 2.8.0 - 2.8.7
Published Aug 01, 2023
Tracked Since Feb 18, 2026