Command Injection Vulnerability in SetSysLogSettings (CVE-2025-60698) 1. Vulnerability Overview 2. Exploitation Path 3. Vulnerable Binaries: and (with cross-binary data flow). 4. 0-Day Command Injection Exploitation Path: In , line 5 executes . The input is subsequently stored at line 8 via . In , line 17 retrieves the stored value through . After string concatenation, the data is passed into line 25 , thereby triggering a command injection vulnerability. 5. Proof of Concept (PoC) for Reproducing the Vulnerability