Get Demo
This vulnerability allows authenticated attackers to execute arbitrary commands on the underlying system using the file name of an uploaded file.