The affected product is vulnerable to unrestricted file uploads, which may allow an attacker to remotely execute code.CreditsTomer Goldschmidt of Claroty Research - Team82 reported these vulnerabilities to CISA.Referenceshttps://www.cisa.gov/news-events/ics-advisories/icsa-24-291-01