Attackers can access the CGE account management function without privilege for permission elevation and execute arbitrary commands or files after obtaining user permissions.
Solution:
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://www.twcert.org.tw/tw/cp-132-4396-e6d44-1.html | third party advisory |
https://www.chtsecurity.com/news/fe1e30ef-4dac-4848-a3c9-a7df12672422 | third party advisory |