An unauthenticated remote attacker can execute arbitrary php files and gain full access of the affected devices.
| Software | From | Fixed in |
|---|---|---|
| metz-connect / ewio2-m_firmware | - | 2.2.0 |
| metz-connect / ewio2-m-bm_firmware | - | 2.2.0 |
| metz-connect / ewio2-bm_firmware | - | 2.2.0 |