2024-01-10 10:40:20
bosch
PUBLISHED
The vulnerability allows an unauthenticated remote attacker to read arbitrary files under the context of the application OS user (“root”) via a crafted HTTP request.