The affected products could allow an unauthenticated attacker to overwrite files and execute arbitrary code.
Get an AI-powered plain-language explanation of this vulnerability and remediation steps.
Login to generate AI explanation1 reference(s) from NVD