A command injection vulnerability in the device’s Root CA certificate transfer workflow allows a high-privileged attacker to send crafted HTTP POST requests that result in arbitrary command execution on the underlying Linux OS with root privileges.CreditsGabriele Quagliarella from Nozomi NetworksReferenceshttps://certvde.com/de/advisories/VDE-2025-104