2025-08-21 19:42:59
icscert
PUBLISHED
An attacker could exploit this vulnerability by uploading arbitrary files via the a specific endpoint, leading to unauthorized remote code execution or system compromise.