CVE-2024-28754
📋 TL;DR
CVE-2024-28754 is a vulnerability in RaspAP (raspap-webgui) that allows remote attackers to send crafted requests causing persistent denial of service, effectively bricking the device. This affects all systems running RaspAP web interface exposed to network access. The vulnerability requires no authentication and can be triggered remotely.
💻 Affected Systems
- RaspAP (raspap-webgui)
📦 What is this software?
Raspap by Raspap
⚠️ Risk & Real-World Impact
Worst Case
Complete device bricking requiring physical reflashing or hardware replacement, with permanent loss of functionality and data.
Likely Case
Persistent service disruption requiring manual intervention to restore functionality, potentially requiring OS reinstallation.
If Mitigated
No impact if device is not exposed to untrusted networks or if proper network segmentation is implemented.
🎯 Exploit Status
The vulnerability requires sending a crafted request to the web interface, which is trivial for attackers with network access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.1.0 or later
Vendor Advisory: https://github.com/RaspAP/raspap-webgui/releases
Restart Required: Yes
Instructions:
1. Backup current configuration. 2. Update RaspAP using: sudo apt update && sudo apt upgrade raspap-webgui. 3. If using manual installation, download latest release from GitHub. 4. Restart the web service: sudo systemctl restart raspap-webgui.
🔧 Temporary Workarounds
Network Access Restriction
linuxRestrict network access to RaspAP web interface using firewall rules
sudo ufw deny 80/tcp
sudo ufw deny 443/tcp
sudo ufw allow from 192.168.1.0/24 to any port 80,443
Disable Web Interface
linuxTemporarily disable the RaspAP web service until patching
sudo systemctl stop raspap-webgui
sudo systemctl disable raspap-webgui
🧯 If You Can't Patch
- Implement strict network segmentation to isolate RaspAP devices from untrusted networks
- Deploy web application firewall (WAF) rules to block suspicious requests to the RaspAP interface
🔍 How to Verify
Check if Vulnerable:
Check RaspAP version: dpkg -l | grep raspap-webgui or check web interface footer for version number
Check Version:
dpkg -l | grep raspap-webgui || echo 'Not installed via package manager'
Verify Fix Applied:
Confirm version is 3.1.0 or higher: dpkg -l | grep raspap-webgui | grep '3.1'
📡 Detection & Monitoring
Log Indicators:
- Unusual HTTP requests to RaspAP endpoints
- Service restart failures in system logs
- Web server error logs showing malformed requests
Network Indicators:
- Multiple crafted HTTP requests to RaspAP web interface from single source
- Unusual traffic patterns to port 80/443 on RaspAP devices
SIEM Query:
source="raspap.log" AND (http_request contains "malformed" OR http_status=500) OR source="auth.log" AND process="raspap-webgui" AND event="failure"