The papd daemon in Netatalk before 2.0.4-beta2, when using certain variables in a pipe command for the print file, allows remote attackers to execute arbitrary commands via shell metacharacters in a print request, as demonstrated using a crafted Title.
Get an AI-powered plain-language explanation of this vulnerability and remediation steps.
Login to generate AI explanation22 reference(s) from NVD