CVE-2022-39986
CRITICAL EXPLOITED NUCLEIRaspap < 2.8.7 - Command Injection
Title source: ruleDescription
A Command injection vulnerability in RaspAP 2.8.0 thru 2.8.7 allows unauthenticated attackers to execute arbitrary commands via the cfg_id parameter in /ajax/openvpn/activate_ovpncfg.php and /ajax/openvpn/del_ovpncfg.php.
Exploits (3)
nomisec
WORKING POC
by mind2hex · remote
https://github.com/mind2hex/CVE-2022-39986-RaspAP-2.8.0-2.8.7-RCE
nomisec
WORKING POC
by tucommenceapousser · remote
https://github.com/tucommenceapousser/RaspAP-CVE-2022-39986-PoC
metasploit
WORKING POC
EXCELLENT
rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/http/raspap_rce.rb
Nuclei Templates (1)
RaspAP 2.8.7 - Unauthenticated Command Injection
CRITICALVERIFIEDby DhiyaneshDK
Shodan:
http.favicon.hash:-1465760059
FOFA:
icon_hash=-1465760059
References (3)
Scores
CVSS v3
9.8
EPSS
0.9306
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2023-11-13
CWE
CWE-77
Status
published
Products (2)
billz/raspap-webgui
2.8.0 - 2.8.8Packagist
raspap/raspap
2.8.0 - 2.8.7
Published
Aug 01, 2023
Tracked Since
Feb 18, 2026