AI Score
Confidence
High
EPSS
Percentile
32.9%
A Command injection vulnerability in RaspAP 2.8.0 thru 2.9.2 allows an authenticated attacker to execute arbitrary OS commands as root via the “entity” POST parameters in /ajax/networking/get_wgkey.php.
github.com/RaspAP/raspap-webgui/blob/master/ajax/networking/get_wgkey.php
medium.com/%40ismael0x00/multiple-vulnerabilities-in-raspap-3c35e78809f2