Cyber Posture

CVE-2025-50428

CriticalPublic PoCRCE

Published: 27 August 2025

Published
27 August 2025
Modified
09 September 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0231 84.9th percentile
Risk Priority 21 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-50428 is a critical-severity Command Injection (CWE-77) vulnerability in Raspap Raspap-Webgui. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Unix Shell (T1059.004); ranked in the top 15.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Unix Shell (T1059.004). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the command injection vulnerability by requiring validation and sanitization of user-supplied inputs like the unsanitized 'interface' parameter in hostapd.php.

prevent

Mitigates the flaw through timely remediation by applying the available patch from GitHub pull request #1833 to eliminate the improper sanitization issue.

prevent

Provides additional protection against command injection by restricting information inputs to approved types, lengths, and formats, complementing sanitization efforts.

MITRE ATT&CK Enterprise TechniquesAI

T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Authenticated OS command injection in the web interface allows arbitrary Unix shell command execution on the Linux host via unsanitized 'interface' parameter used in exec and shell_exec calls.

NVD Description

In RaspAP raspap-webgui 3.3.2 and earlier, a command injection vulnerability exists in the includes/hostapd.php script. The vulnerability is due to improper sanitizing of user input passed via the interface parameter.

Deeper analysisAI

CVE-2025-50428 is a command injection vulnerability in RaspAP raspap-webgui versions 3.3.2 and earlier. The flaw exists in the includes/hostapd.php script due to improper sanitization of user input passed via the interface parameter, classified under CWE-77. It carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity with high impacts across confidentiality, integrity, and availability.

A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the affected web interface, injecting arbitrary commands through the unsanitized interface parameter. No user interaction or privileges are required, enabling low-complexity network-based attacks that could lead to full system compromise, including arbitrary code execution on the underlying host.

Advisories and patches address mitigation via updates to RaspAP raspap-webgui. A fix is available in GitHub pull request #1833 at https://github.com/RaspAP/raspap-webgui/pull/1833. Further details on the vulnerability and remediation are provided in the Smarttecs advisory at https://blog.smarttecs.com/posts/2025-004-cve-2025-50428/.

Details

CWE(s)

Affected Products

raspap
raspap-webgui
≤ 3.3.2

CVEs Like This One

CVE-2025-25743Shared CWE-77
CVE-2025-59046Shared CWE-77
CVE-2025-29228Shared CWE-77
CVE-2025-52690Shared CWE-77
CVE-2025-14756Shared CWE-77
CVE-2026-3518Shared CWE-77
CVE-2024-43028Shared CWE-77
CVE-2024-12992Shared CWE-77
CVE-2026-22623Shared CWE-77
CVE-2024-57539Shared CWE-77

References