{"id":"CVE-2021-33356","details":"Multiple privilege escalation vulnerabilities in RaspAP 1.5 to 2.6.5 could allow an authenticated remote attacker to inject arbitrary commands to /installers/common.sh component that can result in remote command execution with root privileges.","modified":"2026-04-10T04:33:39.505390Z","published":"2021-06-09T18:15:08.640Z","references":[{"type":"ADVISORY","url":"https://gist.github.com/omriinbar/52c000c02a6992c6ce68d531195f69cf"},{"type":"EVIDENCE","url":"https://github.com/RaspAP/raspap-webgui/blob/5a7b77459839c9420fac0d10ec28cee1af9bb782/installers/common.sh#L231"},{"type":"EVIDENCE","url":"https://github.com/RaspAP/raspap-webgui/blob/5a7b77459839c9420fac0d10ec28cee1af9bb782/installers/common.sh#L314"},{"type":"EVIDENCE","url":"https://github.com/RaspAP/raspap-webgui/blob/5a7b77459839c9420fac0d10ec28cee1af9bb782/installers/common.sh#L407"},{"type":"EVIDENCE","url":"https://github.com/RaspAP/raspap-webgui/blob/5a7b77459839c9420fac0d10ec28cee1af9bb782/installers/common.sh#L510"},{"type":"EVIDENCE","url":"https://github.com/RaspAP/raspap-webgui/blob/5a7b77459839c9420fac0d10ec28cee1af9bb782/installers/common.sh#L216"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/raspap/raspap-webgui","events":[{"introduced":"dd63294a37ef469763dd9ef1b64cc17765b410fc"},{"last_affected":"6d3966dd8a54dad2b85b39f2ab0fa476143f2059"}],"database_specific":{"versions":[{"introduced":"1.5"},{"last_affected":"2.6.5"}]}}],"versions":["1.5","1.5.1","1.6","1.6.1","1.6.2","2.0","2.2","2.3","2.3.1","2.4","2.4-beta","2.4.1","2.5","2.5.1","2.5.2","2.6","2.6-beta","2.6.1","2.6.2","2.6.3","2.6.4","2.6.5"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-33356.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}