2025-12-24 19:55:43
icscert
PUBLISHED
A remote unauthenticated attacker may be able to bypass authentication by utilizing a specific API route to execute arbitrary OS commands.