Description

RaspAP raspap-webgui 3.3.1 is vulnerable to Directory Traversal in ajax/networking/get_wgkey.php. An authenticated attacker can send a crafted POST request with a path traversal payload in the `entity` parameter to overwrite arbitrary files writable by the web server via abuse of the `tee` command used in shell execution.

INFO

Published Date :

2025-06-27T00:00:00.000Z

Last Modified :

2025-06-27T20:01:03.722Z

Source :

mitre
AFFECTED PRODUCTS

The following products are affected by CVE-2025-44163 vulnerability.

Vendors Products
Raspap
  • Raspap-webgui
REFERENCES

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact