2025-06-16 09:46:13
CERTVDE
PUBLISHED
A web application for configuring the controller is accessible at a specific path. It contains an endpoint that allows a high privileged remote attacker to read files from the system’s file structure.