This vulnerability could allow a remote attacker to execute remote commands with improper validation of parameters of certain API constructors. Remote attackers could use this vulnerability to execute malicious commands such as directory traversal.Referenceshttps://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66963