Product
A remote, authenticated attacker can exploit a vulnerability in FRRouting Project FRRouting to manipulate data.