RaspAP raspap-webgui 3.3.1 is vulnerable to Directory Traversal in ajax/networking/get_wgkey.php. An authenticated attacker can send a crafted POST request with a path traversal payload in the `entity` parameter to overwrite arbitrary files writable by the web server via abuse of the `tee` command used in shell execution.
| Package (Ecosystem) | Introduced | Fixed | Limit |
|---|---|---|---|
| billz/raspap-webgui(Packagist) | 0 | 3.3.6 | N/A |
CVSS Metrics