ID:5867 - Exploit for OS Command Injection in rConfig - CVE-2019-16662

 
Main Vulnerability Database Exploits ID:5867 - Exploit for OS Command Injection in rConfig - CVE-2019-16662

ID:5867 - Exploit for OS Command Injection in rConfig - CVE-2019-16662

Published: June 17, 2021


Vulnerability identifier: #VU22514
Vulnerability risk: High
CVE-ID: CVE-2019-16662
CWE-ID: CWE-78
Exploitation vector: Remote access
Vulnerable software:
rConfig

Link to public exploit:


Vulnerability description

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to the "rootUname" parameter is passed to the "exec" function without filtering. A remote unauthenticated attacker can send a specially crafted GET request to "ajaxServerSettingsChk.php" file and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.