PatchSiren cyber security CVE debrief
CVE-2019-16662 Unknown Vendor CVE debrief
CVE-2019-16662 describes a direct command-execution issue in rConfig 3.9.2. The supplied description says an attacker can send a GET request to ajaxServerSettingsChk.php and reach the exec function through the rootUname parameter without filtering. That makes this a high-priority issue for any exposed or in-use affected instance.
- Vendor
- Unknown Vendor
- Product
- Unknown
- CVSS
- Unknown
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2019-10-28
- Original CVE updated
- 2026-05-15
- Advisory published
- 2026-05-15
- Advisory updated
- 2026-05-15
Who should care
Administrators and security teams responsible for rConfig 3.9.2 deployments, especially systems reachable over the network or used to manage infrastructure.
Technical summary
The provided CVE description states that ajaxServerSettingsChk.php passes the rootUname parameter to exec without filtering. Because the request is sent over GET, the vulnerable path is network-reachable if the endpoint is accessible. The EPSS signal provided with this record is very high (0.94461, 99.994th percentile), which increases operational concern, though it is only a probability signal and not proof of exploitation.
Defensive priority
High. The issue is described as direct system command execution, and the supplied EPSS signal indicates a strong likelihood of exploitation interest. Treat exposed instances as urgent to assess.
Recommended defensive actions
- Identify whether rConfig 3.9.2 is deployed anywhere in your environment.
- Restrict or block access to the affected endpoint if exposure cannot be eliminated immediately.
- Apply the vendor's fixed version or other official remediation if available from authoritative sources.
- Review web and system logs for requests to ajaxServerSettingsChk.php and other signs of unexpected command execution.
- If the system was exposed, validate host integrity and investigate for unauthorized changes or persistence.
Evidence notes
This debrief is based on the supplied CVE description, which explicitly names rConfig 3.9.2, ajaxServerSettingsChk.php, the rootUname parameter, and unchecked use of exec. Risk context is further supported by the supplied EPSS record from FIRST showing a score of 0.94461 and percentile 0.99994. Official CVE and NVD links are included as reference points; no additional facts were inferred beyond the provided corpus.
Official resources
-
CVE-2019-16662 CVE record
CVE.org
-
CVE-2019-16662 NVD detail
NVD
-
Source item URL
first_epss
CVE published on 2019-10-28T11:52:13.000Z. The CVE record was modified on 2026-05-15T00:00:00.000Z; that modified date should not be treated as the original issue date.