2024-10-15 10:27:06
CERTVDE
PUBLISHED
An unauthenticated local attacker can gain admin privileges by deploying a config file due to improper input validation.