2022-04-20 15:30:31
icscert
PUBLISHED
The affected product is vulnerable to a network-based attack by threat actors utilizing crafted naming conventions of files to gain unauthorized access rights.