Sunday, June 15, 2025
HomeCyber Security News2 Unpatched Critical RCE Bug Disclosed in Open Source Network Configuration Utility...

2 Unpatched Critical RCE Bug Disclosed in Open Source Network Configuration Utility “rConfig”

Published on

SIEM as a Service

Follow Us on Google News

Two unpatched remote command execution vulnerabilities have been identified in popular open-source network management system rConfig.

Rconfig was written in PHP, a utility used by network engineers to record snapshots of the devices and to monitor device configurations for policy compliance. According to the project website, it is used by more than 7,000 active users.

Critical RCE – rConfig

Security researcher Askar discovered two critical remote code execution vulnerabilities (CVE-2019-16663) and (CVE-2019-16662) in the latest version of rConfig which is v3.9.2.

- Advertisement - Google News

The vulnerability CVE-2019-16662, the pre-auth, and CVE-2019-16663, the post-auth remote code execution that present in rConfig(3.9.2).

Askar able to detect two remote command execution vulnerabilities with different file one with “ajaxServerSettingsChk.php” suffers unauthenticated RCE that can be triggered by an attacker sending a request via “rootUname” parameter.

rConfig
Root Uname

The second one is an authenticated RCE discovered in a file called “search.crud.php”, it can be exploited by attackers by sending a “searchTerm” and the value you want.

RCE
Search Query

Another researcher with online handle Sudokaikan, further analyzed the rConfig’s source code stated that “not only rConfig 3.9.2 has those vulnerabilities but also all versions of it.”

Researcher Johannes of SANS Technology Institute detected the active exploitation of the vulnerability. “The exploits came from over 300 different sources at that point, and still kept coming in at a pretty steady pace.”

rConfig

Seems the exploit is currently under development, the exploit string used verified the system vulnerable. “I assume that a botnet is used to scan for the vulnerability, and the origin hosts have been infected themselves.”

Askar reported the vulnerability to rConfig developer, but the issue was not yet fixed and no reply from the rConfig maintainer’s team. After 35 days of waiting he released the exploit.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates

Also Read

PHP7 Remote Code Execution Bug Let Hackers Hijack Websites Running On NGINX Servers

Microsoft NTLM Vulnerability Let Hackers to Compromise the Network Domain Controller

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...