CVE-2021-33358

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-33358
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-33358.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-33358
Published
2021-06-09T18:15:08Z
Modified
2025-02-09T01:44:46.103225Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Multiple vulnerabilities exist in RaspAP 2.3 to 2.6.5 in the "interface", "ssid" and "wpa_passphrase" POST parameters in /hostapd, when the parameter values contain special characters such as ";" or "$()" which enables an authenticated attacker to execute arbitrary OS commands.

References

Affected packages

Git / github.com/raspap/raspap-webgui

Affected ranges

Type
GIT
Repo
https://github.com/raspap/raspap-webgui
Events

Affected versions

2.*

2.3
2.3.1
2.4
2.4-beta
2.4.1
2.5
2.5.1
2.5.2
2.6
2.6-beta
2.6.1
2.6.2
2.6.3
2.6.4
2.6.5