2024-03-12 08:10:58
CERTVDE
PUBLISHED
An unauthenticated remote attacker can modify configurations to perform a remote code execution, gain root rights or perform an DoS due to improper input validation.