CVE-2019-16662 Scanner

CVE-2019-16662 scanner - OS Command Injection vulnerability in rConfig

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

15 seconds

Time Interval

29 days

Scan only one

URL

Toolbox

-

rConfig is an open-source network configuration management tool that is used for managing network devices and monitoring configurations. It is designed to simplify the management of networking devices by providing an automated configuration process. The tool can be useful for system administrators, network engineers, and security analysts who are responsible for managing devices in a network.

Recently, a vulnerability named CVE-2019-16662 was discovered in rConfig 3.9.2. This vulnerability can allow attackers to execute system commands by sending a GET request to ajaxServerSettingsChk.php. The rootUname parameter is passed to the exec function without filtering, which enables attackers to execute command code on the system.

When the CVE-2019-16662 vulnerability is exploited, it can lead to significant security risks. Attackers can gain unauthorized access, control system settings, and access sensitive information. They can manipulate configurations and deploy malware on the system. Additionally, they can disrupt network operations and cause downtime, leading to financial losses and reputational damage.

At s4e.io, we offer pro features that can help you quickly and easily identify vulnerabilities in your digital assets. With our platform, you can stay ahead of potential security risks and protect your systems from unwanted attacks. Our team of security experts is always available to help you with any security concerns you may have. Stay safe and secure with s4e.io.

 

REFERENCES

Get started to protecting your Free Full Security Scan