Severity

8.4

Vulnerability Type

Improper Input Validation (CWE-20)

Summary

An unauthenticated local attacker can gain admin privileges by deploying a config file due to improper input validation.