CVE-2024-28754: n/a
RaspAP (aka raspap-webgui) through 3.0.9 allows remote attackers to cause a persistent denial of service (bricking) via a crafted request.
AI Analysis
Technical Summary
CVE-2024-28754 is a vulnerability identified in RaspAP, a popular open-source web GUI for configuring wireless access points on Raspberry Pi devices, up to version 3.0.9. The flaw allows remote attackers to send a crafted HTTP request that triggers a persistent denial of service condition, effectively bricking the device. This means the device becomes non-functional and requires physical access to restore operation, such as reflashing the device or hardware reset. The vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, increasing the risk of widespread exploitation. The CVSS v3.1 base score is 7.5, reflecting high severity due to the network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact is limited to availability, with no confidentiality or integrity loss reported. No patches or exploit code are currently publicly available, and no known active exploitation has been reported. RaspAP is widely used in Raspberry Pi-based wireless access points, often deployed in home, educational, and small business environments, making the vulnerability relevant to a broad user base. The lack of authentication requirement and the ability to cause a persistent denial of service make this vulnerability particularly dangerous in exposed network environments.
Potential Impact
The primary impact of CVE-2024-28754 is a persistent denial of service that bricks the affected device, causing complete loss of availability. For organizations relying on RaspAP-configured Raspberry Pi devices as wireless access points or IoT gateways, this can result in network outages, loss of connectivity, and operational disruption. The persistent nature of the denial of service means that remote recovery is not possible, requiring physical access to the device for remediation, which can be costly and time-consuming. This can be especially problematic in remote or distributed environments where Raspberry Pi devices are deployed. While confidentiality and integrity are not directly impacted, the loss of availability can indirectly affect business continuity and service delivery. The vulnerability's ease of exploitation and lack of authentication requirements increase the risk of opportunistic attacks, potentially by automated scanning or malware. Although no active exploitation is currently known, the high severity score and impact on critical network infrastructure components make this a significant threat to organizations using RaspAP.
Mitigation Recommendations
1. Immediately restrict network access to RaspAP web interfaces by implementing firewall rules or network segmentation to limit exposure to trusted networks only. 2. Monitor network traffic for unusual or malformed HTTP requests targeting RaspAP endpoints to detect potential exploitation attempts. 3. Disable or uninstall RaspAP on devices where it is not essential to reduce the attack surface. 4. For critical deployments, consider replacing RaspAP with alternative, actively maintained wireless access point management solutions until a patch is released. 5. Maintain physical security controls to prevent unauthorized access to devices, as recovery from this vulnerability requires physical intervention. 6. Stay informed on updates from RaspAP developers and apply patches promptly once available. 7. Implement network-level intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect exploitation attempts once signatures become available. 8. Regularly back up device configurations and data to facilitate recovery in case of device bricking. 9. Educate network administrators about this vulnerability and the importance of limiting exposure of management interfaces.
Affected Countries
United States, United Kingdom, Germany, France, Canada, Australia, Netherlands, India, Japan, South Korea
CVE-2024-28754: n/a
Description
RaspAP (aka raspap-webgui) through 3.0.9 allows remote attackers to cause a persistent denial of service (bricking) via a crafted request.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-28754 is a vulnerability identified in RaspAP, a popular open-source web GUI for configuring wireless access points on Raspberry Pi devices, up to version 3.0.9. The flaw allows remote attackers to send a crafted HTTP request that triggers a persistent denial of service condition, effectively bricking the device. This means the device becomes non-functional and requires physical access to restore operation, such as reflashing the device or hardware reset. The vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, increasing the risk of widespread exploitation. The CVSS v3.1 base score is 7.5, reflecting high severity due to the network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact is limited to availability, with no confidentiality or integrity loss reported. No patches or exploit code are currently publicly available, and no known active exploitation has been reported. RaspAP is widely used in Raspberry Pi-based wireless access points, often deployed in home, educational, and small business environments, making the vulnerability relevant to a broad user base. The lack of authentication requirement and the ability to cause a persistent denial of service make this vulnerability particularly dangerous in exposed network environments.
Potential Impact
The primary impact of CVE-2024-28754 is a persistent denial of service that bricks the affected device, causing complete loss of availability. For organizations relying on RaspAP-configured Raspberry Pi devices as wireless access points or IoT gateways, this can result in network outages, loss of connectivity, and operational disruption. The persistent nature of the denial of service means that remote recovery is not possible, requiring physical access to the device for remediation, which can be costly and time-consuming. This can be especially problematic in remote or distributed environments where Raspberry Pi devices are deployed. While confidentiality and integrity are not directly impacted, the loss of availability can indirectly affect business continuity and service delivery. The vulnerability's ease of exploitation and lack of authentication requirements increase the risk of opportunistic attacks, potentially by automated scanning or malware. Although no active exploitation is currently known, the high severity score and impact on critical network infrastructure components make this a significant threat to organizations using RaspAP.
Mitigation Recommendations
1. Immediately restrict network access to RaspAP web interfaces by implementing firewall rules or network segmentation to limit exposure to trusted networks only. 2. Monitor network traffic for unusual or malformed HTTP requests targeting RaspAP endpoints to detect potential exploitation attempts. 3. Disable or uninstall RaspAP on devices where it is not essential to reduce the attack surface. 4. For critical deployments, consider replacing RaspAP with alternative, actively maintained wireless access point management solutions until a patch is released. 5. Maintain physical security controls to prevent unauthorized access to devices, as recovery from this vulnerability requires physical intervention. 6. Stay informed on updates from RaspAP developers and apply patches promptly once available. 7. Implement network-level intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect exploitation attempts once signatures become available. 8. Regularly back up device configurations and data to facilitate recovery in case of device bricking. 9. Educate network administrators about this vulnerability and the importance of limiting exposure of management interfaces.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-03-08T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d98b7ef31ef0b5891ce
Added to database: 2/25/2026, 9:46:00 PM
Last enriched: 2/26/2026, 5:41:56 PM
Last updated: 4/12/2026, 6:13:14 PM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.