2023-12-19 01:41:12
@huntr_ai
PUBLISHED
with only one user interaction(download a malicious config), attackers can gain full command execution on the victim system.