2020-04-09 13:08:55
icscert
PUBLISHED
An attacker could use a specially crafted URL to delete or read files outside the WebAccess/NMSs (versions prior to 3.0.2) control.