Vulnerability Key Information Summary 1. Vulnerability Overview Vulnerability Name: Command Injection Vulnerability CVE ID: Severity: Critical Detailed Description: In the file of (versions up to 2.5.3), the function contains a vulnerability. Attackers can execute arbitrary operating system commands by manipulating the and parameters. This vulnerability is classified as OS Command Injection (CWE-78, CWE-77, CWE-74). 2. Scope of Impact Affected Product: Affected Versions: 2.5.0 2.5.1 2.5.2 2.5.3 3. Remediation Recommended Action: Upgrade the software version. Fixed Version: Patch Hash: Additional Information: The related exploit (Proof-of-Concept) can be downloaded from GitHub. 4. POC / Exploit Code The provided screenshot does not contain specific POC code blocks, but offers the following key exploitation information: Exploitation Method: Inject malicious input into the or parameters. Exploitation Status: Proof-of-Concept (PoC) is available. Access Level**: Public.