Specially-crafted HTTP requests can lead to arbitrary command execution in PUT requests. An attacker can make authenticated HTTP requests to trigger this vulnerability.Referenceshttps://talosintelligence.com/vulnerability_reports/TALOS-2021-1315