Rconfig 3.x Chained Remote Code Execution
Posted by deepcore on March 17, 2020 – 11:18 am
This Metasploit module takes advantage of a command injection vulnerability in the path parameter of the ajax archive file functionality within the rConfig web interface in order to execute the payload. Valid credentials for a user with administrative privileges are required . However, this module can bypass authentication via SQL injection.
Post a reply
You must be logged in to post a comment.