The second method worked for me.
if there is a writeable dir on the server, it is possible to upload a PHP script via writeconfig and to gain control upon the whole machine.
A good hint for me was to look for other .cfg and .ini files in the game folder. I've found a path to a writeable dir in a .cfg for an extension which purpose was to parse the game's log files and write them to the folder for displaying online.I tested it on Jedi Academy, running JA+ v.2.3 mod and several other mods via QMM, but I think any other Quake3 engine-based game might be vulnerable.
So the conclusion is:
1) Steal the RCON
2) Write your PHP code into one or more variables
3) Find a writeable dir which is accessible from the web
4) writeconfig path/to/writeable_dir/shell.php
5)
http://www.target.com/writeable_dir/shell.phpand that's it.
P.S.
Unfortunately, one of the largest JKA communities in Eastern Europe, which was the target of my experiment, exists no more because of remote shell execution, some dude who helped me with testing that and other(public) vulnerabilities, formatted their hard drives as soon as he gain access. I'm angry of it, and I suppose that everyone who hosts a q3-based game server and a PHP site on the same machine must be aware of this and check their folder permissions.