Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-19331 | raspap-webgui has a Directory Traversal vulnerability |
Github GHSA |
GHSA-277f-37gw-9gmq | raspap-webgui has a Directory Traversal vulnerability |
Mon, 10 Nov 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Raspap
Raspap raspap-webgui |
|
| CPEs | cpe:2.3:a:raspap:raspap-webgui:3.3.1:*:*:*:*:*:*:* | |
| Vendors & Products |
Raspap
Raspap raspap-webgui |
Fri, 27 Jun 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-23 | |
| Metrics |
cvssV3_1
|
Fri, 27 Jun 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | RaspAP raspap-webgui 3.3.1 is vulnerable to Directory Traversal in ajax/networking/get_wgkey.php. An authenticated attacker can send a crafted POST request with a path traversal payload in the `entity` parameter to overwrite arbitrary files writable by the web server via abuse of the `tee` command used in shell execution. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-06-27T20:01:03.722Z
Reserved: 2025-04-22T00:00:00.000Z
Link: CVE-2025-44163
Updated: 2025-06-27T20:00:56.802Z
Status : Analyzed
Published: 2025-06-27T14:15:37.417
Modified: 2025-11-10T20:38:28.663
Link: CVE-2025-44163
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA