ID:5867 - Exploit for OS Command Injection in rConfig - CVE-2019-16662
Published: June 17, 2021
rConfig
Link to public exploit:
Vulnerability description
The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to the "rootUname" parameter is passed to the "exec" function without filtering. A remote unauthenticated attacker can send a specially crafted GET request to "ajaxServerSettingsChk.php" file and execute arbitrary OS commands on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.