A remote attacker with high privileges may use a reading file function to inject OS commands. CreditsLogan CarpenterDragosReferenceshttps://cert.vde.com/en/advisories/VDE-2024-012