2025-10-14 08:35:05
CERTVDE
PUBLISHED
An low privileged remote attacker with an account for the Web-based management can change the system configuration to perform a command injection as root, resulting in a total loss of confidentiality, availability and integrity due to improper control of generation of code (Code Injection).