ID:5737 - Exploit for OS Command Injection in rConfig - CVE-2019-19509
Published: June 17, 2021
rConfig
Link to public exploit:
Vulnerability description
The vulnerability allows a remote user to execute arbitrary shell commands on the target system.
The vulnerability exists due to absent filtration of user-supplied data passed to ajaxArchiveFiles.php script. A remote authenticated user can send a specially crafted HTTP GET request to the affected script and execute arbitrary OS commands on the target system.