Логотип exploitDog
bind:CVE-2021-38557
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-38557

Количество 2

Количество 2

nvd логотип

CVE-2021-38557

больше 4 лет назад

raspap-webgui in RaspAP 2.6.6 allows attackers to execute commands as root because of the insecure sudoers permissions. The www-data account can execute /etc/raspap/hostapd/enablelog.sh as root with no password; however, the www-data account can also overwrite /etc/raspap/hostapd/enablelog.sh with any executable content.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-536p-4pcj-5mr9

больше 4 лет назад

raspap-webgui in RaspAP 2.6.6 allows attackers to execute commands as root because of the insecure sudoers permissions.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-38557

raspap-webgui in RaspAP 2.6.6 allows attackers to execute commands as root because of the insecure sudoers permissions. The www-data account can execute /etc/raspap/hostapd/enablelog.sh as root with no password; however, the www-data account can also overwrite /etc/raspap/hostapd/enablelog.sh with any executable content.

CVSS3: 8.8
1%
Низкий
больше 4 лет назад
github логотип
GHSA-536p-4pcj-5mr9

raspap-webgui in RaspAP 2.6.6 allows attackers to execute commands as root because of the insecure sudoers permissions.

CVSS3: 8.8
1%
Низкий
больше 4 лет назад

Уязвимостей на страницу