Loading
An issue was discovered in rConfig 3.9.2. An attacker can directly execute system commands by sending a GET request to ajaxServerSettingsChk.php because the rootUname parameter is passed to the exec function without filtering, which can lead to command execution.
Use CWE-78, Rconfig vendor hub and Rconfig product page to widen CVE-2019-16662 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2020-25359, CVE-2023-39110 and CVE-2023-39109 for nearby disclosures in the same product family.