Логотип exploitDog
bind:CVE-2025-44163
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-44163

Количество 2

Количество 2

nvd логотип

CVE-2025-44163

5 месяцев назад

RaspAP raspap-webgui 3.3.1 is vulnerable to Directory Traversal in ajax/networking/get_wgkey.php. An authenticated attacker can send a crafted POST request with a path traversal payload in the `entity` parameter to overwrite arbitrary files writable by the web server via abuse of the `tee` command used in shell execution.

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-277f-37gw-9gmq

5 месяцев назад

raspap-webgui has a Directory Traversal vulnerability

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-44163

RaspAP raspap-webgui 3.3.1 is vulnerable to Directory Traversal in ajax/networking/get_wgkey.php. An authenticated attacker can send a crafted POST request with a path traversal payload in the `entity` parameter to overwrite arbitrary files writable by the web server via abuse of the `tee` command used in shell execution.

CVSS3: 6.3
0%
Низкий
5 месяцев назад
github логотип
GHSA-277f-37gw-9gmq

raspap-webgui has a Directory Traversal vulnerability

0%
Низкий
5 месяцев назад

Уязвимостей на страницу