2025-11-06 22:27:14
icscert
PUBLISHED
Due to insufficient sanitization, an attacker can upload a specially crafted configuration file to traverse directories and achieve remote code execution with system-level permissions.