Ajenti 2.1.31 Remote Code Execution This Metasploit module exploits a command injection vulnerability in Ajenti versions 2.1.31 and below. By injecting a command into the username POST parameter to api/core/auth, a shell can be spawned. Leave a ReplyYou must be logged in to post a comment. Filed under: exploit - @ October 31, 2019 12:01 pm