rconfig CVE Vulnerabilities & Metrics

Focus on rconfig vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About rconfig Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with rconfig. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total rconfig CVEs: 44
Earliest CVE date: 28 Oct 2019, 12:15 UTC
Latest CVE date: 01 Aug 2023, 14:15 UTC

Latest CVE reference: CVE-2023-39110

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical rconfig CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 5.53

Max CVSS: 10.0

Critical CVEs (≥9): 6

CVSS Range vs. Count

Range Count
0.0-3.9 9
4.0-6.9 21
7.0-8.9 8
9.0-10.0 6

CVSS Distribution Chart

Top 5 Highest CVSS rconfig CVEs

These are the five CVEs with the highest CVSS scores for rconfig, sorted by severity first and recency.

All CVEs for rconfig

CVE-2023-39110 rconfig vulnerability CVSS: 0 01 Aug 2023, 14:15 UTC

rconfig v3.9.4 was discovered to contain a Server-Side Request Forgery (SSRF) via the path parameter at /ajaxGetFileByPath.php. This vulnerability allows authenticated attackers to make arbitrary requests via injection of crafted URLs.

CVE-2023-39109 rconfig vulnerability CVSS: 0 01 Aug 2023, 14:15 UTC

rconfig v3.9.4 was discovered to contain a Server-Side Request Forgery (SSRF) via the path_a parameter in the doDiff Function of /classes/compareClass.php. This vulnerability allows authenticated attackers to make arbitrary requests via injection of crafted URLs.

CVE-2023-39108 rconfig vulnerability CVSS: 0 01 Aug 2023, 14:15 UTC

rconfig v3.9.4 was discovered to contain a Server-Side Request Forgery (SSRF) via the path_b parameter in the doDiff Function of /classes/compareClass.php. This vulnerability allows authenticated attackers to make arbitrary requests via injection of crafted URLs.

CVE-2022-45030 rconfig vulnerability CVSS: 0 15 Apr 2023, 02:15 UTC

A SQL injection vulnerability in rConfig 3.9.7 exists via lib/ajaxHandlers/ajaxCompareGetCmdDates.php?command= (this may interact with secure-file-priv).

CVE-2023-24366 rconfig vulnerability CVSS: 0 27 Mar 2023, 21:15 UTC

An arbitrary file download vulnerability in rConfig v6.8.0 allows attackers to download sensitive files via a crafted HTTP request.

CVE-2022-44384 rconfig vulnerability CVSS: 0 17 Nov 2022, 17:15 UTC

An arbitrary file upload vulnerability in rconfig v3.9.6 allows attackers to execute arbitrary code via a crafted PHP file.

CVE-2021-29006 rconfig vulnerability CVSS: 4.0 11 Oct 2021, 13:15 UTC

rConfig 3.9.6 is affected by a Local File Disclosure vulnerability. An authenticated user may successfully download any file on the server.

CVE-2021-29005 rconfig vulnerability CVSS: 9.0 11 Oct 2021, 13:15 UTC

Insecure permission of chmod command on rConfig server 3.9.6 exists. After installing rConfig apache user may execute chmod as root without password which may let an attacker with low privilege to gain root access on server.

CVE-2021-29004 rconfig vulnerability CVSS: 6.5 11 Oct 2021, 12:15 UTC

rConfig 3.9.6 is affected by SQL Injection. A user must be authenticated to exploit the vulnerability. If --secure-file-priv in MySQL server is not set and the Mysql server is the same as rConfig, an attacker may successfully upload a webshell to the server and access it remotely.

CVE-2020-27466 rconfig vulnerability CVSS: 6.8 20 Aug 2021, 19:15 UTC

An arbitrary file write vulnerability in lib/AjaxHandlers/ajaxEditTemplate.php of rConfig 3.9.6 allows attackers to execute arbitrary code via a crafted file.

CVE-2020-27464 rconfig vulnerability CVSS: 6.8 20 Aug 2021, 19:15 UTC

An insecure update feature in the /updater.php component of rConfig 3.9.6 and below allows attackers to execute arbitrary code via a crafted ZIP file.

CVE-2020-25359 rconfig vulnerability CVSS: 6.4 20 Aug 2021, 19:15 UTC

An arbitrary file deletion vulnerability in rConfig 3.9.5 has been fixed for 3.9.6. This vulnerability gave attackers the ability to send a crafted request to /lib/ajaxHandlers/ajaxDeleteAllLoggingFiles.php by specifying a path in the path parameter and an extension in the ext parameter and delete all the files with that extension in that path.

CVE-2020-25353 rconfig vulnerability CVSS: 4.0 20 Aug 2021, 19:15 UTC

A server-side request forgery (SSRF) vulnerability in rConfig 3.9.5 has been fixed for 3.9.6. This vulnerability allowed remote authenticated attackers to open a connection to the machine via the deviceIpAddr and connPort parameters.

CVE-2020-25352 rconfig vulnerability CVSS: 3.5 20 Aug 2021, 19:15 UTC

A stored cross-site scripting (XSS) vulnerability in the /devices.php function inrConfig 3.9.5 has been fixed for version 3.9.6. This vulnerability allowed remote attackers to perform arbitrary Javascript execution through entering a crafted payload into the 'Model' field then saving.

CVE-2020-25351 rconfig vulnerability CVSS: 4.0 20 Aug 2021, 19:15 UTC

An information disclosure vulnerability in rConfig 3.9.5 has been fixed for version 3.9.6. This vulnerability allowed remote authenticated attackers to read files on the system via a crafted request sent to to the /lib/crud/configcompare.crud.php script.

CVE-2020-23151 rconfig vulnerability CVSS: 7.5 09 Aug 2021, 23:15 UTC

rConfig 3.9.5 allows command injection by sending a crafted GET request to lib/ajaxHandlers/ajaxArchiveFiles.php since the path parameter is passed directly to the exec function without being escaped.

CVE-2020-23150 rconfig vulnerability CVSS: 5.0 09 Aug 2021, 23:15 UTC

A SQL injection vulnerability in config.inc.php of rConfig 3.9.5 allows attackers to access sensitive database information via a crafted GET request to install/lib/ajaxHandlers/ajaxDbInstall.php.

CVE-2020-23149 rconfig vulnerability CVSS: 5.0 09 Aug 2021, 23:15 UTC

The dbName parameter in ajaxDbInstall.php of rConfig 3.9.5 is unsanitized, allowing attackers to perform a SQL injection and access sensitive database information.

CVE-2020-23148 rconfig vulnerability CVSS: 5.0 09 Aug 2021, 23:15 UTC

The userLogin parameter in ldap/login.php of rConfig 3.9.5 is unsanitized, allowing attackers to perform a LDAP injection and obtain sensitive information via a crafted POST request.

CVE-2020-13638 rconfig vulnerability CVSS: 7.5 13 Nov 2020, 20:15 UTC

lib/crud/userprocess.php in rConfig 3.9.x before 3.9.7 has an authentication bypass, leading to administrator account creation. This issue has been fixed in 3.9.7.

CVE-2020-13778 rconfig vulnerability CVSS: 9.0 19 Oct 2020, 13:15 UTC

rConfig 3.9.4 and earlier allows authenticated code execution (of system commands) by sending a forged GET request to lib/ajaxHandlers/ajaxAddTemplate.php or lib/ajaxHandlers/ajaxEditTemplate.php.

CVE-2020-15715 rconfig vulnerability CVSS: 6.5 28 Jul 2020, 14:15 UTC

rConfig 3.9.5 could allow a remote authenticated attacker to execute arbitrary code on the system, because of an error in the search.crud.php script. An attacker could exploit this vulnerability using the nodeId parameter.

CVE-2020-15714 rconfig vulnerability CVSS: 6.5 28 Jul 2020, 14:15 UTC

rConfig 3.9.5 is vulnerable to SQL injection. A remote authenticated attacker could send crafted SQL statements to the devices.crud.php script using the custom_Location parameter, which could allow the attacker to view, add, modify, or delete information in the back-end database.

CVE-2020-15713 rconfig vulnerability CVSS: 6.5 28 Jul 2020, 14:15 UTC

rConfig 3.9.5 is vulnerable to SQL injection. A remote authenticated attacker could send crafted SQL statements to the devices.php script using the sortBy parameter, which could allow the attacker to view, add, modify, or delete information in the back-end database.

CVE-2020-15712 rconfig vulnerability CVSS: 4.0 28 Jul 2020, 14:15 UTC

rConfig 3.9.5 could allow a remote authenticated attacker to traverse directories on the system. An attacker could send a crafted request to the ajaxGetFileByPath.php script containing hexadecimal encoded "dot dot" sequences (%2f..%2f) in the path parameter to view arbitrary files on the system.

CVE-2020-10549 rconfig vulnerability CVSS: 7.5 04 Jun 2020, 04:15 UTC

rConfig 3.9.4 and previous versions has unauthenticated snippets.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.

CVE-2020-10548 rconfig vulnerability CVSS: 7.5 04 Jun 2020, 04:15 UTC

rConfig 3.9.4 and previous versions has unauthenticated devices.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.

CVE-2020-10547 rconfig vulnerability CVSS: 7.5 04 Jun 2020, 04:15 UTC

rConfig 3.9.4 and previous versions has unauthenticated compliancepolicyelements.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.

CVE-2020-10546 rconfig vulnerability CVSS: 7.5 04 Jun 2020, 04:15 UTC

rConfig 3.9.4 and previous versions has unauthenticated compliancepolicies.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.

CVE-2020-12256 rconfig vulnerability CVSS: 3.5 18 May 2020, 15:15 UTC

rConfig 3.9.4 is vulnerable to reflected XSS. The devicemgmnt.php file improperly validates user input. An attacker can exploit this by crafting arbitrary JavaScript in the deviceId GET parameter to devicemgmnt.php.

CVE-2020-12255 rconfig vulnerability CVSS: 6.5 18 May 2020, 15:15 UTC

rConfig 3.9.4 is vulnerable to remote code execution due to improper validation in the file upload functionality. vendor.crud.php accepts a file upload by checking content-type without considering the file extension and header. Thus, an attacker can exploit this by uploading a .php file to vendor.php that contains arbitrary PHP code and changing the content-type to image/gif.

CVE-2020-12258 rconfig vulnerability CVSS: 6.4 18 May 2020, 14:15 UTC

rConfig 3.9.4 is vulnerable to session fixation because session expiry and randomization are mishandled. The application can reuse a session via PHPSESSID. Also, an attacker can exploit this vulnerability in conjunction with CVE-2020-12256 or CVE-2020-12259.

CVE-2020-12257 rconfig vulnerability CVSS: 6.8 18 May 2020, 14:15 UTC

rConfig 3.9.4 is vulnerable to cross-site request forgery (CSRF) because it lacks implementation of CSRF protection such as a CSRF token. An attacker can leverage this vulnerability by creating a form (add a user, delete a user, or edit a user).

CVE-2020-12259 rconfig vulnerability CVSS: 3.5 18 May 2020, 13:15 UTC

rConfig 3.9.4 is vulnerable to reflected XSS. The configDevice.php file improperly validates user input. An attacker can exploit this vulnerability by crafting arbitrary JavaScript in the rid GET parameter of devicemgmnt.php.

CVE-2020-10879 rconfig vulnerability CVSS: 7.5 23 Mar 2020, 22:15 UTC

rConfig before 3.9.5 allows command injection by sending a crafted GET request to lib/crud/search.crud.php since the nodeId parameter is passed directly to the exec function without being escaped.

CVE-2020-9425 rconfig vulnerability CVSS: 5.0 20 Mar 2020, 18:15 UTC

An issue was discovered in includes/head.inc.php in rConfig before 3.9.4. An unauthenticated attacker can retrieve saved cleartext credentials via a GET request to settings.php. Because the application was not exiting after a redirect is applied, the rest of the page still executed, resulting in the disclosure of cleartext credentials in the response.

CVE-2020-10221 rconfig vulnerability CVSS: 9.0 08 Mar 2020, 22:15 UTC

lib/ajaxHandlers/ajaxAddTemplate.php in rConfig through 3.94 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the fileName POST parameter.

CVE-2020-10220 rconfig vulnerability CVSS: 7.5 07 Mar 2020, 23:15 UTC

An issue was discovered in rConfig through 3.9.4. The web interface is prone to a SQL injection via the commands.inc.php searchColumn parameter.

CVE-2019-19585 rconfig vulnerability CVSS: 4.6 06 Jan 2020, 20:15 UTC

An issue was discovered in rConfig 3.9.3. The install script updates the /etc/sudoers file for rconfig specific tasks. After an "rConfig specific Apache configuration" update, apache has high privileges for some binaries. This can be exploited by an attacker to bypass local security restrictions.

CVE-2019-19509 rconfig vulnerability CVSS: 9.0 06 Jan 2020, 20:15 UTC

An issue was discovered in rConfig 3.9.3. A remote authenticated user can directly execute system commands by sending a GET request to ajaxArchiveFiles.php because the path parameter is passed to the exec function without filtering, which can lead to command execution.

CVE-2019-19372 rconfig vulnerability CVSS: 5.0 28 Nov 2019, 15:15 UTC

A downloadFile.php download_file path traversal vulnerability in rConfig through 3.9.3 allows attackers to list files in arbitrary folders and potentially download files. NOTE: the discoverer later reported that there was not a "fully working exploit.

CVE-2019-19207 rconfig vulnerability CVSS: 6.5 21 Nov 2019, 22:15 UTC

rConfig 3.9.2 allows devices.php?searchColumn= SQL injection.

CVE-2019-16663 rconfig vulnerability CVSS: 9.0 28 Oct 2019, 12:15 UTC

An issue was discovered in rConfig 3.9.2. An attacker can directly execute system commands by sending a GET request to search.crud.php because the catCommand parameter is passed to the exec function without filtering, which can lead to command execution.

CVE-2019-16662 rconfig vulnerability CVSS: 10.0 28 Oct 2019, 12:15 UTC

An issue was discovered in rConfig 3.9.2. An attacker can directly execute system commands by sending a GET request to ajaxServerSettingsChk.php because the rootUname parameter is passed to the exec function without filtering, which can lead to command execution.