Skip to main content

CVE-2025-44163: n/a

Medium
VulnerabilityCVE-2025-44163cvecve-2025-44163
Published: Fri Jun 27 2025 (06/27/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

RaspAP raspap-webgui 3.3.1 is vulnerable to Directory Traversal in ajax/networking/get_wgkey.php. An authenticated attacker can send a crafted POST request with a path traversal payload in the `entity` parameter to overwrite arbitrary files writable by the web server via abuse of the `tee` command used in shell execution.

AI-Powered Analysis

AILast updated: 06/27/2025, 14:25:22 UTC

Technical Analysis

CVE-2025-44163 is a directory traversal vulnerability affecting raspap-webgui version 3.3.1, a web-based interface used to manage RaspAP, a popular software for configuring Raspberry Pi as a wireless access point. The vulnerability exists in the ajax/networking/get_wgkey.php script, specifically in the handling of the 'entity' POST parameter. An authenticated attacker can craft a malicious POST request containing a path traversal payload in this parameter. Due to improper input validation, this payload can manipulate the file path used by the server-side script. The vulnerability is further exacerbated by the use of the 'tee' command in shell execution, which allows the attacker to overwrite arbitrary files writable by the web server. This means that an attacker with valid credentials can write arbitrary content to files on the server, potentially leading to code execution, privilege escalation, or persistent backdoors. The vulnerability requires authentication, limiting exploitation to users who have access to the web interface. However, the impact is significant because the attacker can overwrite files, which may include configuration files, scripts, or other sensitive data. No CVSS score has been assigned yet, and no known exploits in the wild have been reported as of the publication date (June 27, 2025). The affected version is specifically raspap-webgui 3.3.1, and no patch links are currently available, indicating that remediation may require manual intervention or updates from the vendor.

Potential Impact

For European organizations using RaspAP with the vulnerable raspap-webgui 3.3.1, this vulnerability poses a serious risk to the confidentiality, integrity, and availability of their network infrastructure. Since RaspAP is often deployed in small office/home office (SOHO) environments, educational institutions, and IoT setups, exploitation could lead to unauthorized modification of network configurations, insertion of malicious code, or disruption of wireless access services. The ability to overwrite arbitrary files could allow attackers to implant persistent malware or backdoors, facilitating long-term unauthorized access. This is particularly concerning for organizations relying on Raspberry Pi devices for critical network functions or as part of their IoT deployments. The requirement for authentication reduces the risk from external attackers but raises concerns about insider threats or compromised credentials. Given the widespread use of Raspberry Pi devices across Europe in various sectors, the vulnerability could have a broad impact if not addressed promptly.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the raspap-webgui interface to trusted users only, ideally via network segmentation or VPN access to reduce exposure. 2. Implement strong authentication mechanisms and enforce strict password policies to prevent unauthorized access. 3. Monitor web server logs for suspicious POST requests targeting ajax/networking/get_wgkey.php, especially those containing unusual path traversal patterns in the 'entity' parameter. 4. Disable or restrict the use of shell commands like 'tee' within the web application if possible, or sanitize inputs rigorously to prevent command injection or path traversal. 5. Apply any available patches or updates from the RaspAP project as soon as they are released. 6. As a temporary workaround, consider removing or restricting write permissions on critical files that could be overwritten by the web server user. 7. Conduct regular security audits of Raspberry Pi devices running RaspAP to detect unauthorized file modifications or suspicious activity. 8. Educate users with access to the interface about the risks and signs of compromise to enhance insider threat detection.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-22T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 685ea6216f40f0eb7263a4bd

Added to database: 6/27/2025, 2:09:37 PM

Last enriched: 6/27/2025, 2:25:22 PM

Last updated: 8/17/2025, 4:53:15 AM

Views: 48

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats