Dirbuster found lots of directories. Got the service and version number. This specific version does have RCE exploits available.
Shell
Using the exploit from https://github.com/dinesh876/CVE-2019-11447-POC and creating a normal using account I was able to get a shell. Had to find the captcha.php to get the account registered.
Had the server connect back to me as the previous shell was just a webshell.