An authenticated attacker with low privileges may use a...
Moderate severity
Unreviewed
Published
Nov 27, 2024
to the GitHub Advisory Database
Description
Published by the National Vulnerability Database
Nov 27, 2024
Published to the GitHub Advisory Database
Nov 27, 2024
An authenticated attacker with low privileges may use a SQL Injection vulnerability in the affected products administration panel to gain read and write access to a specific log file of the device.
References