2024-01-10 10:38:46
bosch
PUBLISHED
The vulnerability allows an unauthenticated remote attacker to upload arbitrary files under the context of the application OS user (“root”) via a crafted HTTP request.