An unauthenticated remote attacker can execute arbitrary...
Critical severity
Unreviewed
Published
Nov 18, 2025
to the GitHub Advisory Database
•
Updated Nov 18, 2025
Description
Published by the National Vulnerability Database
Nov 18, 2025
Published to the GitHub Advisory Database
Nov 18, 2025
Last updated
Nov 18, 2025
An unauthenticated remote attacker can execute arbitrary php files and gain full access of the affected devices.
References