An low privileged remote attacker can execute OS commands with root privileges due to improper neutralization of special elements in user data.CreditsAndrea PalancaNozomi Networks Security Research TeamReferenceshttps://cert.vde.com/en/advisories/VDE-2024-039