Extreme Hot Vendor
- Jan 28, 2016
- Reaction score
This Metasploit module takes advantage of a command injection vulnerability in the path parameter of the ajax archive file functionality within the rConfig web interface in order to execute the payload. Valid credentials for a user with administrative privileges are required.
However, this module can bypass authentication via SQL injection.