mirror of
https://github.com/gobysec/GobyVuls.git
synced 2025-06-20 01:40:20 +00:00
add : CVE-2021-33357
This commit is contained in:
parent
92e794f91b
commit
75e7b8df85
BIN
RaspAP/CVE-2021-33357/CVE-2021-33357.gif
Normal file
BIN
RaspAP/CVE-2021-33357/CVE-2021-33357.gif
Normal file
Binary file not shown.
After Width: | Height: | Size: 1.1 MiB |
10
RaspAP/CVE-2021-33357/README.md
Normal file
10
RaspAP/CVE-2021-33357/README.md
Normal file
@ -0,0 +1,10 @@
|
|||||||
|
|
||||||
|
# RaspAP Operating System Command Injection Vulnerability (CVE-2021-33357)
|
||||||
|
|
||||||
|
RaspAP is an application software for simple wireless AP setup and management for Debian based devicesThere is an operating system command injection vulnerability in RaspAP, which stems from improper filtering of special characters such as \";\" in the \"iface\" parameter in RaspAP versions 2.6 to 2.6.5. An attacker can use this vulnerability to execute arbitrary operating system commands.
|
||||||
|
|
||||||
|
FOFA **query rule**: [header="RaspAP"|| banner="RaspAP"](https://fofa.info/result?qbase64=aGVhZGVyPSJSYXNwQVAifHwgYmFubmVyPSJSYXNwQVAi)
|
||||||
|
|
||||||
|
# Demo
|
||||||
|
|
||||||
|

|
Loading…
x
Reference in New Issue
Block a user