CVE-2025-44163

RaspAP raspap-webgui 3.3.1 is vulnerable to Directory Traversal in ajax/networking/get_wgkey.php. An authenticated attacker can send a crafted POST request with a path traversal payload in the `entity` parameter to overwrite arbitrary files writable by the web server via abuse of the `tee` command used in shell execution.
Configurations

Configuration 1 (hide)

cpe:2.3:a:raspap:raspap-webgui:3.3.1:*:*:*:*:*:*:*

History

10 Nov 2025, 20:38

Type Values Removed Values Added
CPE cpe:2.3:a:raspap:raspap-webgui:3.3.1:*:*:*:*:*:*:*
First Time Raspap raspap-webgui
Raspap
References () https://gist.github.com/YichaoXu/3694f039a3d1b973efd068e4dc662a41 - () https://gist.github.com/YichaoXu/3694f039a3d1b973efd068e4dc662a41 - Exploit, Mitigation, Third Party Advisory
References () https://github.com/RaspAP/raspap-webgui/blob/125ae7a39ad7c9a71250d3b3e349fd767687ff8d/ajax/networking/get_wgkey.php#L9 - () https://github.com/RaspAP/raspap-webgui/blob/125ae7a39ad7c9a71250d3b3e349fd767687ff8d/ajax/networking/get_wgkey.php#L9 - Product

Information

Published : 2025-06-27 14:15

Updated : 2025-11-10 20:38


NVD link : CVE-2025-44163

Mitre link : CVE-2025-44163

CVE.ORG link : CVE-2025-44163


JSON object : View

Products Affected

raspap

  • raspap-webgui
CWE
CWE-23

Relative Path Traversal