The vulnerability poses a significant risk, potentially allowing malicious users to manipulate system settings, access sensitive data, and compromise the application’s integrity.
Copyright @2025 The University of Hong Kong. All Rights Reserved.