An authenticated attacker with low privileges may use a SQL Injection vulnerability in the affected products administration panel to gain read and write access to a specific log file of the device.
This Cyber News was published on www.tenable.com. Publication date: Thu, 28 Nov 2024 13:11:03 +0000