Security for everyone

CVE-2019-16662 Scanner

Detects 'OS Command Injection' vulnerability in rConfig affects v. 3.9.2.


Short Info



Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

15 sec

Scan only one




rConfig is an open-source network configuration management tool that is used for managing network devices and monitoring configurations. It is designed to simplify the management of networking devices by providing an automated configuration process. The tool can be useful for system administrators, network engineers, and security analysts who are responsible for managing devices in a network.

Recently, a vulnerability named CVE-2019-16662 was discovered in rConfig 3.9.2. This vulnerability can allow attackers to execute system commands by sending a GET request to ajaxServerSettingsChk.php. The rootUname parameter is passed to the exec function without filtering, which enables attackers to execute command code on the system.

When the CVE-2019-16662 vulnerability is exploited, it can lead to significant security risks. Attackers can gain unauthorized access, control system settings, and access sensitive information. They can manipulate configurations and deploy malware on the system. Additionally, they can disrupt network operations and cause downtime, leading to financial losses and reputational damage.

At, we offer pro features that can help you quickly and easily identify vulnerabilities in your digital assets. With our platform, you can stay ahead of potential security risks and protect your systems from unwanted attacks. Our team of security experts is always available to help you with any security concerns you may have. Stay safe and secure with



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture