2023-12-11 07:13:51
CERTVDE
PUBLISHED
This vulnerability allows an remote attacker with low privileges to misuse Improper Control of Generation of Code (Code Injection) to gain full control of the affected device.