The successful exploitation of this vulnerability enables an attacker to manipulate file upload parameters, potentially allowing path traversal. This manipulation could lead to the upload of a malicious file, escalating the risk of remote code execution.
Recommended Actions
The National Cyber Security Authority (NCSA) strongly recommends to system administrators to: