2021-10-22 13:23:22
icscert
PUBLISHED
The affected product is vulnerable to a unsanitized extract folder for system configuration. A low-privileged user can leverage this logic to overwrite the settings and other key functionality.