CVE-2024-11025
27.11.2024, 11:17
An authenticated attacker with low privileges may use a SQL Injection vulnerability in the affected products administration panel to gain read and write access to a specific log file of the device.
Awaiting analysis
This vulnerability is currently awaiting analysis.