CVE-2021-38485
The affected product is vulnerable to improper input validation in the restore file. This enables an attacker to provide malicious config files to replace any file on disk.
Source: CVE-2021-38485
CVE-2021-38485
The affected product is vulnerable to improper input validation in the restore file. This enables an attacker to provide malicious config files to replace any file on disk.
Source: CVE-2021-38485