2022-02-04 22:29:28
icscert
PUBLISHED
The affected product is vulnerable to an authenticated OS command injection, which may allow an attacker to inject and execute arbitrary shell commands as the Admin (root) user.