IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22
Path traversal vulnerabilities are caused by a lack of proper validation of a user-supplied path prior to use in file operations. An attacker can leverage these vulnerabilities to remotely execute code while posing as an administrator.
MISSING AUTHORIZATION CWE-862
There is an unsecured function that allows anyone who can access the IP address to use the function without authentication.
IMPROPER RESTRICTION OF XML EXTERNAL ENTITY REFERENCE CWE-611
XXE vulnerabilities exist that may allow disclosure of sensitive data.
IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89
Lack of sanitization of user-supplied input cause SQL injection vulnerabilities. An attacker can leverage these vulnerabilities to disclose information.
https://www.us-cert.gov/ics/advisories/icsa-19-304-01