RaspAP raspap-webgui 3.3.1 is vulnerable to Directory Traversal in ajax/networking/get_wgkey.php. An authenticated attacker can send a crafted POST request with a path traversal payload in the entity
parameter to overwrite arbitrary files writable by the web server via abuse of the tee
command used in shell execution.
{ "nvd_published_at": "2025-06-27T14:15:37Z", "cwe_ids": [ "CWE-22", "CWE-23" ], "github_reviewed": true, "github_reviewed_at": "2025-06-27T20:48:15Z", "severity": "HIGH" }