2025-07-21 09:30:44
CERTVDE
PUBLISHED
A high privileged remote attacker can alter the configuration database via POST requests due to improper neutralization of special elements used in a SQL statement.