with only one user interaction(download a malicious config), attackers can gain full command execution on the victim system.
{
"severity": "HIGH",
"nvd_published_at": "2023-12-19T02:15:45Z",
"github_reviewed_at": "2023-12-19T21:24:02Z",
"github_reviewed": true,
"cwe_ids": [
"CWE-77"
]
}