ELOG allows an authenticated user to modify or overwrite the configuration file, resulting in denial of service. If the execute facility is specifically enabled with the "-x" command line flag, attackers could execute OS commands on the host machine. By default, ELOG is not configured to allow shell commands or self-registration.
| Software | From | Fixed in |
|---|---|---|
| elog_project / elog | - | 3.1.5-20251014.x |