First published: Tue Dec 17 2024(Updated: )
Due to the flaws in the verification of input parameters, the attacker can input carefully constructed commands to make the ABE service execute some commands with root privilege.
Credit: security@vivo.com
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.