The affected controllers do not properly sanitize the input containing code syntax. As a result, an attacker could craft code to alter the intended controller flow of the software.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Tracer_concierge | Trane | * | 5.5 (excluding) |
Tracer_concierge | Trane | 5.5 (including) | 5.5 (including) |