CVE-2025-59818
This vulnerability allows authenticated attackers to execute arbitrary commands on the underlying system using the file name of an uploaded file.
More information : https://wiki.zenitel.com/wiki/Turbine_9.3_-_Release_notes
This vulnerability allows authenticated attackers to execute arbitrary commands on the underlying system using the file name of an uploaded file.
More information : https://wiki.zenitel.com/wiki/Turbine_9.3_-_Release_notes