2023-10-03 15:03:03
INCIBE
PUBLISHED
This vulnerability allows an authenticated attacker to upload malicious files by bypassing the restrictions of the upload functionality, compromising the entire device.