2024-09-17 17:13:18
icscert
PUBLISHED
There is a command injection vulnerability that may allow an attacker to inject malicious input on the devices operating system.