A low privileged remote attacker can gain the root password due to improper removal of sensitive information before storage or transfer.CreditsAndrea PalancaNozomi Networks Security Research TeamReferenceshttps://certvde.com/en/advisories/VDE-2024-039