Severity

7.8

Vulnerability Type

Improper Input Validation (CWE-20) external link

Summary

A local attacker with low privileges can use a command injection vulnerability to gain root privileges due to improper input validation using the OCPP Remote service.