2024-12-06 17:21:44
icscert
PUBLISHED
The affected product is vulnerable to a command injection. An unauthenticated attacker could send commands through a malicious HTTP request which could result in remote code execution.