Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2023-30260

Command injection vulnerability in RaspAP raspap-webgui 2.8.8 and earlier allows remote attackers to run arbitrary commands via crafted POST request to hostapd settings form.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.027
EPSS Ranking 85.2%
CVSS Severity
CVSS v3 Score 8.8
Products affected by CVE-2023-30260
  • Raspap » Raspap » Version: 1.0
    cpe:2.3:a:raspap:raspap:1.0
  • Raspap » Raspap » Version: 1.1
    cpe:2.3:a:raspap:raspap:1.1
  • Raspap » Raspap » Version: 1.2.0
    cpe:2.3:a:raspap:raspap:1.2.0
  • Raspap » Raspap » Version: 1.2.1
    cpe:2.3:a:raspap:raspap:1.2.1
  • Raspap » Raspap » Version: 1.3.0
    cpe:2.3:a:raspap:raspap:1.3.0
  • Raspap » Raspap » Version: 1.3.1
    cpe:2.3:a:raspap:raspap:1.3.1
  • Raspap » Raspap » Version: 1.4.0
    cpe:2.3:a:raspap:raspap:1.4.0
  • Raspap » Raspap » Version: 1.4.1
    cpe:2.3:a:raspap:raspap:1.4.1
  • Raspap » Raspap » Version: 1.5
    cpe:2.3:a:raspap:raspap:1.5
  • Raspap » Raspap » Version: 1.5.1
    cpe:2.3:a:raspap:raspap:1.5.1
  • Raspap » Raspap » Version: 1.6
    cpe:2.3:a:raspap:raspap:1.6
  • Raspap » Raspap » Version: 1.6.1
    cpe:2.3:a:raspap:raspap:1.6.1
  • Raspap » Raspap » Version: 1.6.2
    cpe:2.3:a:raspap:raspap:1.6.2
  • Raspap » Raspap » Version: 2.0
    cpe:2.3:a:raspap:raspap:2.0
  • Raspap » Raspap » Version: 2.1
    cpe:2.3:a:raspap:raspap:2.1
  • Raspap » Raspap » Version: 2.2
    cpe:2.3:a:raspap:raspap:2.2
  • Raspap » Raspap » Version: 2.3
    cpe:2.3:a:raspap:raspap:2.3
  • Raspap » Raspap » Version: 2.3.1
    cpe:2.3:a:raspap:raspap:2.3.1
  • Raspap » Raspap » Version: 2.4
    cpe:2.3:a:raspap:raspap:2.4
  • Raspap » Raspap » Version: 2.4.1
    cpe:2.3:a:raspap:raspap:2.4.1
  • Raspap » Raspap » Version: 2.5
    cpe:2.3:a:raspap:raspap:2.5
  • Raspap » Raspap » Version: 2.5.1
    cpe:2.3:a:raspap:raspap:2.5.1
  • Raspap » Raspap » Version: 2.5.2
    cpe:2.3:a:raspap:raspap:2.5.2
  • Raspap » Raspap » Version: 2.6
    cpe:2.3:a:raspap:raspap:2.6
  • Raspap » Raspap » Version: 2.6.1
    cpe:2.3:a:raspap:raspap:2.6.1
  • Raspap » Raspap » Version: 2.6.2
    cpe:2.3:a:raspap:raspap:2.6.2
  • Raspap » Raspap » Version: 2.6.3
    cpe:2.3:a:raspap:raspap:2.6.3
  • Raspap » Raspap » Version: 2.6.4
    cpe:2.3:a:raspap:raspap:2.6.4
  • Raspap » Raspap » Version: 2.6.5
    cpe:2.3:a:raspap:raspap:2.6.5
  • Raspap » Raspap » Version: 2.6.6
    cpe:2.3:a:raspap:raspap:2.6.6
  • Raspap » Raspap » Version: 2.6.7
    cpe:2.3:a:raspap:raspap:2.6.7
  • Raspap » Raspap » Version: 2.6.8
    cpe:2.3:a:raspap:raspap:2.6.8
  • Raspap » Raspap » Version: 2.6.9
    cpe:2.3:a:raspap:raspap:2.6.9
  • Raspap » Raspap » Version: 2.7.0
    cpe:2.3:a:raspap:raspap:2.7.0
  • Raspap » Raspap » Version: 2.7.1
    cpe:2.3:a:raspap:raspap:2.7.1
  • Raspap » Raspap » Version: 2.8.0
    cpe:2.3:a:raspap:raspap:2.8.0
  • Raspap » Raspap » Version: 2.8.1
    cpe:2.3:a:raspap:raspap:2.8.1
  • Raspap » Raspap » Version: 2.8.2
    cpe:2.3:a:raspap:raspap:2.8.2
  • Raspap » Raspap » Version: 2.8.3
    cpe:2.3:a:raspap:raspap:2.8.3
  • Raspap » Raspap » Version: 2.8.4
    cpe:2.3:a:raspap:raspap:2.8.4
  • Raspap » Raspap » Version: 2.8.5
    cpe:2.3:a:raspap:raspap:2.8.5
  • Raspap » Raspap » Version: 2.8.6
    cpe:2.3:a:raspap:raspap:2.8.6
  • Raspap » Raspap » Version: 2.8.7
    cpe:2.3:a:raspap:raspap:2.8.7
  • Raspap » Raspap » Version: 2.8.8
    cpe:2.3:a:raspap:raspap:2.8.8


Contact Us

Shodan ® - All rights reserved