CVE-2021-38556
Description
includes/configure_client.php in RaspAP 2.6.6 allows attackers to execute commands via command injection.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
RaspAP 2.6.6's `configure_client.php` allows unauthenticated attackers to execute arbitrary commands via command injection.
Vulnerability
includes/configure_client.php in RaspAP version 2.6.6 contains a command injection vulnerability. The script does not properly sanitize user-supplied input before passing it to a system command, allowing an attacker to inject arbitrary operating system commands. The vulnerability exists in the default installation and does not require any special configuration to be reachable [1][2].
Exploitation
An attacker can exploit this vulnerability by sending a crafted HTTP request to the configure_client.php endpoint with malicious payload in the affected parameter(s). No authentication is required, and the attacker only needs network access to the RaspAP web interface. The injected commands are executed with the privileges of the web server user [1][2][3].
Impact
Successful exploitation allows an attacker to execute arbitrary commands on the underlying operating system. This can lead to full compromise of the device, including data exfiltration, installation of backdoors, or lateral movement within the network. The impact is severe as RaspAP is often installed on network-facing devices like Raspberry Pi routers [1][2].
Mitigation
Users should upgrade to a patched version of RaspAP. The official GitHub repository has addressed this issue in subsequent releases; upgrading to the latest version is recommended. If upgrading is not immediately possible, administrators should restrict network access to the RaspAP web interface to trusted hosts only [1][2].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
billz/raspap-webguiPackagist | <= 2.6.6 | — |
Affected products
2- RaspAP/RaspAPdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-7vph-p634-vrqfghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-38556ghsaADVISORY
- github.com/RaspAP/raspap-webgui/blob/0e1d652c5e55f812aaf2a5908884e9db179416ee/includes/configure_client.phpghsax_refsource_MISCWEB
- zerosecuritypenetrationtesting.comghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.