Vulnerability Details CVE-2023-30260
Command injection vulnerability in RaspAP raspap-webgui 2.8.8 and earlier allows remote attackers to run arbitrary commands via crafted POST request to hostapd settings form.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.027
EPSS Ranking 85.2%
CVSS Severity
CVSS v3 Score 8.8
Products affected by CVE-2023-30260
-
cpe:2.3:a:raspap:raspap:1.0
-
cpe:2.3:a:raspap:raspap:1.1
-
cpe:2.3:a:raspap:raspap:1.2.0
-
cpe:2.3:a:raspap:raspap:1.2.1
-
cpe:2.3:a:raspap:raspap:1.3.0
-
cpe:2.3:a:raspap:raspap:1.3.1
-
cpe:2.3:a:raspap:raspap:1.4.0
-
cpe:2.3:a:raspap:raspap:1.4.1
-
cpe:2.3:a:raspap:raspap:1.5
-
cpe:2.3:a:raspap:raspap:1.5.1
-
cpe:2.3:a:raspap:raspap:1.6
-
cpe:2.3:a:raspap:raspap:1.6.1
-
cpe:2.3:a:raspap:raspap:1.6.2
-
cpe:2.3:a:raspap:raspap:2.0
-
cpe:2.3:a:raspap:raspap:2.1
-
cpe:2.3:a:raspap:raspap:2.2
-
cpe:2.3:a:raspap:raspap:2.3
-
cpe:2.3:a:raspap:raspap:2.3.1
-
cpe:2.3:a:raspap:raspap:2.4
-
cpe:2.3:a:raspap:raspap:2.4.1
-
cpe:2.3:a:raspap:raspap:2.5
-
cpe:2.3:a:raspap:raspap:2.5.1
-
cpe:2.3:a:raspap:raspap:2.5.2
-
cpe:2.3:a:raspap:raspap:2.6
-
cpe:2.3:a:raspap:raspap:2.6.1
-
cpe:2.3:a:raspap:raspap:2.6.2
-
cpe:2.3:a:raspap:raspap:2.6.3
-
cpe:2.3:a:raspap:raspap:2.6.4
-
cpe:2.3:a:raspap:raspap:2.6.5
-
cpe:2.3:a:raspap:raspap:2.6.6
-
cpe:2.3:a:raspap:raspap:2.6.7
-
cpe:2.3:a:raspap:raspap:2.6.8
-
cpe:2.3:a:raspap:raspap:2.6.9
-
cpe:2.3:a:raspap:raspap:2.7.0
-
cpe:2.3:a:raspap:raspap:2.7.1
-
cpe:2.3:a:raspap:raspap:2.8.0
-
cpe:2.3:a:raspap:raspap:2.8.1
-
cpe:2.3:a:raspap:raspap:2.8.2
-
cpe:2.3:a:raspap:raspap:2.8.3
-
cpe:2.3:a:raspap:raspap:2.8.4
-
cpe:2.3:a:raspap:raspap:2.8.5
-
cpe:2.3:a:raspap:raspap:2.8.6
-
cpe:2.3:a:raspap:raspap:2.8.7
-
cpe:2.3:a:raspap:raspap:2.8.8