A Command injection vulnerability in RaspAP 2.8.0 thru 2.8.7 allows unauthenticated attackers to execute arbitrary commands via the cfg_id parameter in /ajax/openvpn/activate_ovpncfg.php and /ajax/openvpn/del_ovpncfg.php.
- http://packetstormsecurity.com/files/174190/RaspAP-2.8.7-Unauthenticated-Command-Injection.html
- https://medium.com/%40ismael0x00/multiple-vulnerabilities-in-raspap-3c35e78809f2
- https://medium.com/@ismael0x00/multiple-vulnerabilities-in-raspap-3c35e78809f2
- https://github.com/WhiteOwl-Pub/RaspAP-CVE-2022-39986-PoC
- https://github.com/getdrive/PoC
- https://github.com/mind2hex/CVE-2022-39986
- https://github.com/mind2hex/CVE-2022-39986-RaspAP-2.8.0-2.8.7-RCE
- https://github.com/mind2hex/RaspAP_Hunter
- https://github.com/mind2hex/gitbook_public
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/tucommenceapousser/RaspAP-CVE-2022-39986-PoC