2025-11-06 22:29:27
icscert
PUBLISHED
Due to insufficient sanitization, an attacker can upload a specially crafted configuration file to traverse directories and achieve remote code execution with system-level permissions.