CVE-2025-44163

RaspAP raspap-webgui 3.3.1 is vulnerable to Directory Traversal in ajax/networking/get_wgkey.php. An authenticated attacker can send a crafted POST request with a path traversal payload in the `entity` parameter to overwrite arbitrary files writable by the web server via abuse of the `tee` command used in shell execution.
Configurations

Configuration 1 (hide)

cpe:2.3:a:raspap:raspap-webgui:3.3.1:*:*:*:*:*:*:*

History

10 Nov 2025, 20:38

Type Values Removed Values Added
First Time Raspap
Raspap raspap-webgui
References () https://gist.github.com/YichaoXu/3694f039a3d1b973efd068e4dc662a41 - () https://gist.github.com/YichaoXu/3694f039a3d1b973efd068e4dc662a41 - Exploit, Mitigation, Third Party Advisory
References () https://github.com/RaspAP/raspap-webgui/blob/125ae7a39ad7c9a71250d3b3e349fd767687ff8d/ajax/networking/get_wgkey.php#L9 - () https://github.com/RaspAP/raspap-webgui/blob/125ae7a39ad7c9a71250d3b3e349fd767687ff8d/ajax/networking/get_wgkey.php#L9 - Product
CPE cpe:2.3:a:raspap:raspap-webgui:3.3.1:*:*:*:*:*:*:*

30 Jun 2025, 18:38

Type Values Removed Values Added
Summary
  • (es) RaspAP raspap-webgui 3.3.1 es vulnerable a Directory Traversal en ajax/networking/get_wgkey.php. Un atacante autenticado puede enviar una solicitud POST manipulada con un payload de path traversal en el parámetro `entity` para sobrescribir archivos arbitrarios con permisos de escritura del servidor web mediante el uso indebido del comando `tee` utilizado en la ejecución del shell.

27 Jun 2025, 20:15

Type Values Removed Values Added
CWE CWE-23
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.3

27 Jun 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-27 14:15

Updated : 2025-11-10 20:38


NVD link : CVE-2025-44163

Mitre link : CVE-2025-44163

CVE.ORG link : CVE-2025-44163


JSON object : View

Products Affected

raspap

  • raspap-webgui
CWE
CWE-23

Relative Path Traversal