RaspAP raspap-webgui 3.3.1 is vulnerable to Directory Traversal in ajax/networking/get_wgkey.php. An authenticated attacker can send a crafted POST request with a path traversal payload in the entity parameter to overwrite arbitrary files writable by the web server via abuse of the tee command used in shell execution.
| Software | From | Fixed in |
|---|---|---|
billz / raspap-webgui
|
- | 3.3.6 |
| raspap / raspap-webgui | 3.3.1 | 3.3.1.x |