In RaspAP raspap-webgui 3.0.9 and earlier, a command injection vulnerability exists in the clearlog.php script. The vulnerability is due to improper sanitization of user input passed via the logfile parameter.
CVSS
No CVSS.
References
Configurations
History
02 Jul 2025, 20:41
Type | Values Removed | Values Added |
---|---|---|
First Time |
Raspap raspap-webgui
Raspap |
|
CPE | cpe:2.3:a:raspap:raspap-webgui:*:*:*:*:*:*:*:* | |
References | () https://github.com/raspap/raspap-webgui/commit/c98d2b0c15942b4829d31dec615b9b40cc6faa14#diff-939ee414d82245c3b3dd7d36b57f10706e06e8f0871b24bdcf9de6e0d181c4c9 - Patch | |
References | () https://gist.github.com/1047524396/ab997b902ec892e592a0df93f38e6941 - Third Party Advisory | |
References | () https://github.com/RaspAP/raspap-webgui/blob/3.0.9/ajax/logging/clearlog.php - Product |
29 Nov 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-29 18:15
Updated : 2025-07-02 20:41
NVD link : CVE-2024-36622
Mitre link : CVE-2024-36622
JSON object : View
Products Affected
raspap
- raspap-webgui
CWE
No CWE.