In RaspAP raspap-webgui 3.3.2 and earlier, a command injection vulnerability exists in the includes/hostapd.php script. The vulnerability is due to improper sanitizing of user input passed via the interface parameter.
References
| Link | Resource |
|---|---|
| https://blog.smarttecs.com/posts/2025-004-cve-2025-50428/ | Exploit Third Party Advisory |
| https://github.com/RaspAP/raspap-webgui/pull/1833 | Issue Tracking Patch |
| https://blog.smarttecs.com/posts/2025-004-cve-2025-50428/ | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-08-27 17:15
Updated : 2025-09-09 18:45
NVD link : CVE-2025-50428
Mitre link : CVE-2025-50428
CVE.ORG link : CVE-2025-50428
JSON object : View
Products Affected
raspap
- raspap-webgui
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
