2026-01-15 12:59:51
SICK AG
PUBLISHED
An attacker may gain unauthorized access to the host filesystem, potentially allowing them to read and modify system data.