CVE-2025-50428
Published: 27 August 2025
Summary
CVE-2025-50428 is a critical-severity Command Injection (CWE-77) vulnerability in Raspap Raspap-Webgui. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Unix Shell (T1059.004); ranked in the top 15.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the command injection vulnerability by requiring validation and sanitization of user-supplied inputs like the unsanitized 'interface' parameter in hostapd.php.
Mitigates the flaw through timely remediation by applying the available patch from GitHub pull request #1833 to eliminate the improper sanitization issue.
Provides additional protection against command injection by restricting information inputs to approved types, lengths, and formats, complementing sanitization efforts.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Authenticated OS command injection in the web interface allows arbitrary Unix shell command execution on the Linux host via unsanitized 'interface' parameter used in exec and shell_exec calls.
NVD Description
In RaspAP raspap-webgui 3.3.2 and earlier, a command injection vulnerability exists in the includes/hostapd.php script. The vulnerability is due to improper sanitizing of user input passed via the interface parameter.
Deeper analysisAI
CVE-2025-50428 is a command injection vulnerability in RaspAP raspap-webgui versions 3.3.2 and earlier. The flaw exists in the includes/hostapd.php script due to improper sanitization of user input passed via the interface parameter, classified under CWE-77. It carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity with high impacts across confidentiality, integrity, and availability.
A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the affected web interface, injecting arbitrary commands through the unsanitized interface parameter. No user interaction or privileges are required, enabling low-complexity network-based attacks that could lead to full system compromise, including arbitrary code execution on the underlying host.
Advisories and patches address mitigation via updates to RaspAP raspap-webgui. A fix is available in GitHub pull request #1833 at https://github.com/RaspAP/raspap-webgui/pull/1833. Further details on the vulnerability and remediation are provided in the Smarttecs advisory at https://blog.smarttecs.com/posts/2025-004-cve-2025-50428/.
Details
- CWE(s)