Loading
rConfig 3.9.5 is vulnerable to SQL injection. A remote authenticated attacker could send crafted SQL statements to the devices.php script using the sortBy parameter, which could allow the attacker to view, add, modify, or delete information in the back-end database.
Use CWE-89, Rconfig vendor hub and Rconfig product page to widen CVE-2020-15713 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2020-25359, CVE-2023-39110 and CVE-2023-39109 for nearby disclosures in the same product family.