2021-10-22 13:23:38
icscert
PUBLISHED
The affected product is vulnerable to improper input validation in the restore file. This enables an attacker to provide malicious config files to replace any file on disk.