A Command injection vulnerability in RaspAP 2.8.0 thru 2.9.2 allows an authenticated attacker to execute arbitrary OS commands as root via the "entity" POST parameters in /ajax/networking/get_wgkey.php.
| Package (Ecosystem) | Introduced | Fixed | Limit |
|---|---|---|---|
| billz/raspap-webgui(Packagist) | 2.8.0 | 2.9.5 | N/A |
CVSS Metrics