In RaspAP raspap-webgui 3.0.9 and earlier, a command injection vulnerability exists in the clearlog.php script. The vulnerability is due to improper sanitization of user input passed via the logfile parameter.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 03 Jul 2025 06:00:00 +0900

Type Values Removed Values Added
First Time appeared Raspap
Raspap raspap-webgui
CPEs cpe:2.3:a:raspap:raspap-webgui:*:*:*:*:*:*:*:*
Vendors & Products Raspap
Raspap raspap-webgui

Wed, 04 Dec 2024 01:15:00 +0900

Type Values Removed Values Added
Weaknesses CWE-94
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 30 Nov 2024 03:15:00 +0900

Type Values Removed Values Added
Description In RaspAP raspap-webgui 3.0.9 and earlier, a command injection vulnerability exists in the clearlog.php script. The vulnerability is due to improper sanitization of user input passed via the logfile parameter.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-12-03T15:26:18.611Z

Reserved: 2024-05-30T00:00:00

Link: CVE-2024-36622

cve-icon Vulnrichment

Updated: 2024-12-03T15:26:13.118Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-29T18:15:08.140

Modified: 2025-07-02T20:41:55.433

Link: CVE-2024-36622

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses