Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-28371 | In RaspAP raspap-webgui 3.3.2 and earlier, a command injection vulnerability exists in the includes/hostapd.php script. The vulnerability is due to improper sanitizing of user input passed via the interface parameter. |
Tue, 09 Sep 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Raspap
Raspap raspap-webgui |
|
| CPEs | cpe:2.3:a:raspap:raspap-webgui:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Raspap
Raspap raspap-webgui |
Fri, 29 Aug 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-77 | |
| Metrics |
cvssV3_1
|
Wed, 27 Aug 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In RaspAP raspap-webgui 3.3.2 and earlier, a command injection vulnerability exists in the includes/hostapd.php script. The vulnerability is due to improper sanitizing of user input passed via the interface parameter. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-08-29T18:25:35.824Z
Reserved: 2025-06-16T00:00:00.000Z
Link: CVE-2025-50428
Updated: 2025-08-29T18:20:20.780Z
Status : Analyzed
Published: 2025-08-27T17:15:41.443
Modified: 2025-09-09T18:45:52.470
Link: CVE-2025-50428
No data.
OpenCVE Enrichment
No data.
EUVD