Affordable, manageable, understandable solution for cyber security. Get early access for Product X !
Stay Up To Date
Need Membership


API Support


Estimate Time (Second)


rConfig SQLi Vulnerability (CVE-2020-10546) Scanner Detail

If you are using rConfig, it is better to check your system if any vulnerability exists.

rConfig 3.9.4 and previous versions has unauthenticated SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.

Some Advice for Common Problems

Update your rConfig Software, to the latest version to eliminate this vulnerability.

Need a Full Assesment?

Get help from professional hackers. Learn about our penetration test service now!

Request Pentest Service