2023-10-26 16:21:56
icscert
PUBLISHED
The application suffers from a privilege escalation vulnerability. A user with read permissions can elevate privileges by sending a HTTP POST to set a parameter.