Hackers can exploit authentication bypass flaw to gain administrative control.

Leave a Reply

Your email address will not be published. Required fields are marked *