Command Execution Vulnerability in RaspAP 2.6.6 by RaspAP
CVE-2021-38557

8.8HIGH

Key Information:

Vendor

Raspap

Status
Vendor
CVE Published:
24 August 2021

What is CVE-2021-38557?

The raspi-webgui in RaspAP version 2.6.6 is susceptible to a command execution vulnerability due to misconfigured sudoers permissions. The www-data user can run the /etc/raspap/hostapd/enablelog.sh script as root without a password. Additionally, this account can manipulate the same script, allowing the injection of malicious commands. This flaw poses significant security risks, enabling unauthorized parties to gain elevated system privileges.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.