with only one user interaction(download a malicious config), attackers can gain full command execution on the victim system.
{ "nvd_published_at": "2023-12-19T02:15:45Z", "cwe_ids": [ "CWE-77" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2023-12-19T21:24:02Z" }